Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
2d5e23969d13d120f8df3c79cbe8a24e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d5e23969d13d120f8df3c79cbe8a24e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2d5e23969d13d120f8df3c79cbe8a24e_JaffaCakes118.html
-
Size
460KB
-
MD5
2d5e23969d13d120f8df3c79cbe8a24e
-
SHA1
b63b3d5959b9324eaac794d581c7d1fd5b0ac071
-
SHA256
1815b9235828575b75cadca070fc12ff8e1c4512e47ee00252ad33870fbe2950
-
SHA512
b1d34c7593541f5bd9555aa22451720eebfded0390eca2885b8ef267e6280d7ad31303ecb1df1cc0dcf3f0edaf375faff0eca754c599010a76e3485ff9ed689c
-
SSDEEP
6144:SSsMYod+X3oI+YXsMYod+X3oI+YksMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3J5d+X3c5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96670861-0E86-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05ee76e93a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000004199622ff787eb7cfc17db5879ca0904447b1bddb8d8a484ebca027ae79772f9000000000e8000000002000020000000dd8bc941e8853e7e57f05e9b9b5ceb6caad45cd50180faf863a7a2d58e8328dd200000006117fcb8dc290dc4a1669b856ea9b982a4269b15ba8f4c545b8bff58373376b240000000e558acf34e5ff24cd96d37149d3195581dd86d9cf2a070c238cbe87de9b72ea37f3a8131cd46967274cd0818c221ae264e64350af3655337c7a1f923c5761aed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421477535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1952 1132 iexplore.exe 28 PID 1132 wrote to memory of 1952 1132 iexplore.exe 28 PID 1132 wrote to memory of 1952 1132 iexplore.exe 28 PID 1132 wrote to memory of 1952 1132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d5e23969d13d120f8df3c79cbe8a24e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5981d41e11f7ae3156c01ed134514c9cf
SHA1d869b19097201652677ea6a29f33e4414746e824
SHA2567b5d9faa4a1fbc60b56a1a6aa7dc215f824224efda2ed29a91863d0e09b47727
SHA5129f85dd661b21ea5e541d0bcd6b874114f58a3d92e539ff9c7dae9da1e05b416342faa7c06d545a51e5a22dd08a3cd5e10e1d8214fd2e4a639dacbfce4d67c7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ab144624bcf078a633bcdab078156d9
SHA16df30b295e239a810013301e0ad15d60ae26b046
SHA256fffc1779a47c5fa576b2bf2e1fca993cafb8836e46bea48a7473a1534c9afb7b
SHA512a9185d6840090eefecd8a1ddda9073add497dce6e4cd06fc508d6b385129d48472ef552c0bd62f534e78bdbe9a4c411eaf9c214ac54a5dcff51fc752d1179e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e6fd2b80f7bb4e9c203cf5dc00182fc
SHA130a10f66a6dc075c894aa1ffcf71c6481a829425
SHA25662597b5087580a5867411a6606646527ae1d512c47fa1943e3ad134f99c1b141
SHA51244bf8edb24949c8c94d011f46d6cad954fe6f8b7d5fc74e419938110203d35953a8526df320510ba9f02ff65fbf0e7b9f6fcf5dea85a8ba2fcbb9191d2d1a3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f3e72dc181b2b16544e6964c5a9c98d
SHA190611f63130db24432176c9d0a096776c2a5e586
SHA2561402c3bd159f904e8e5340b3e2bd5ff796ba881270f5529706bb288a56cde96c
SHA512c7d7aa5e8fe7f27085870069e66665121bd9cf87cc245316d4f640169f154a1cfc07cff9b6f2bd9ec8eb81a4c4ed9cafecd1d2dca632bc2c1e4b9f488420bcec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553c815f679736acffef44fc69c487b56
SHA116ef015281d8485fac9eb946703f5b551ac6598e
SHA2564593a37fc26fd076bc950fdf76d5cc378e618eb5d6e0370fdbfd780929a68478
SHA51285cc9e3f6230ce5f1c0c38911bac7b643771026078659048386d8199cbd56c4a5f649196721e59d9d7fb5872c1e214f473925eb9186dbc58544fc09714260f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef0a3c0ab12e8950f7775fad9567483f
SHA1f91d368916de7fe25e096ebe922638c7ebceebfc
SHA256a393ee8e8e53ba557b5afd3613803938240af34156a070540b6584c1ad33ef4b
SHA512fe58ea9ceefd6f837bfdb2a8e0770bee0af09b4c40c5f96c92f7c91b667f0fbfe2c8adb76411c4875a3a7cd8288e48e9c5c20a28ec452b4788ee8594f3d276ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515eabbb2138695b43b3a1e2620e861e9
SHA1408390d9e3221864aba348bbed7879a359975712
SHA256128b62b31c05dc2244d609222c9311832fd46d29355817b757d0293ca334a17f
SHA5125941a3e75ea07a1698c566a2a743a43a9bd94ec5be5223885189206dbda0d0ac55b04ee98bd4522df967e05f896d186db1ae3a368faf0dcd017114728c842b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5464002449d734e2479bc29bae177a8ed
SHA1d41e134f2a5d6e43b056f509f0889a68b3c77f82
SHA25671ba6f1b15e6ed5836e897f32f3ef68983ac75941e2ddeb33aae2c89f753e313
SHA5127298d27f5d3b81954f6695b69d9b1074e37faa9c7e53bbcbf09ccba6001561d95408a23104497876723d9702e3de3fda3cbb9893eb187713ddcbe01837ed0eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a22536bf4023ec4a12ea532f22c7e011
SHA1d736ec6c68c5db95611c700261df0f7ab577e038
SHA25624db5ecc43ce9d2382755961098ebdfe8958d4d45f7ec951844f69711f238cee
SHA512bfb0091ebe84a16ee6ce8fa1604605fbab77f417b4f9ae46bdf22187e65cf2295bfeaad6b2eeb55f54e4b074ea799af22cf6f6a483035ab6e9e1c8e2c05db2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f46ba4c67265d589a3b26bf8db96c9d
SHA17d2bb087231fce43d3a95b07b488bd55b0821cfc
SHA256a9ac5777676c8717221e91392af47c967baf0c8d9d8046dcaf6b130d369a5bf4
SHA5120681868e7c044702bb819ddf0160be8e7cc12fe7805aab147a3759601d806a09a22ebf764372add19ed272d489cf9e89fa64e3899549792fefd4b03cee865921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51459a6d6a46e464673b00a5a2f3034b2
SHA1539a6990ff732c040c59cb2b937430457798adc1
SHA2566625f1224c560c11fd83ae530326229a145ac057b018f02bc5f78f67495c407b
SHA512b6ae47826dd701aae805a17a30a871af658041a2625cf31156af3a37e5a792230b21631d40a2d5ed813429612e625c9df0c3bbdd36939109b9bae14b24f4ca0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51036b375f34ada9abd775bab2d71dc8f
SHA11a2cdd3c55336d00ded49a3fac785df75c7d4aaa
SHA2568b712b9c27a09ef323949497549a660361b4c9932d97320984c475d8eee2b9f2
SHA512b68941a0aaed1da415bd407358cca3561544006e4e859524c6e2b2a515c7a20db5858efde1085ed6ef017e33bf07d88fc6b1e457a0897a0c5f698fcd5df52373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a686278d68bd6ba4923e91e2a39ba99
SHA1c5594bd99e054219b102294d74fe2923428a344d
SHA25680eea02dfb595f822fb375ca9940d4d932466166a4a432edbf6695d43f961bd5
SHA512e097eaa81a30a37896d3cb6942ec4f7f5aa2a125d16437e26c8a739b26b969ef6e9dfecf20ab96cfca02ad3b025147760c611107588841e1862315da8e4371a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576a7ec68b3107f456d4afbc9e5d30b0f
SHA1fa26472f83c1a4c25c03c0783e42ebb30f4c1195
SHA25688d8baf175d88b6fd0f3bb86ed2e6aead9d505a9e80f4cc537c858df9b5a8863
SHA512380cc5eca478c36d8357a55bb3ca1c56ed77d981a62e259a8484bc40dd35ed2d17946691a0f17566f64a3c3f8fb0aac378adb02897106b8ba365caea55032c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548273dbe5715fdcf0e8f1d9e35882cdf
SHA124b4119052add85349b206ea2bd375133ce064cd
SHA256ab38b2e2efe8dff980c9571d0f428a64da10ce4073c67ec7e0af4621f5a70e5b
SHA512222fe35aa3f31a3129110250c648b88ab447d3ae6f2697ec4690cf4f3bf0b501c45dc7204722aebfce9d56d91cf49317051b1af29edce7631f462c75dd6f97ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1a020f9ad44c83563f7ad38020c3f19
SHA15f0d20827c5473602a24ed62fe297c04b25efd03
SHA2568394215570ce008c74a82f117e4bf51726baae6c80f7b95353286dc8ca3540d5
SHA5126b18c33a8bea5b05b15a6b2351a315c97e92c30a3e3619961269bb80776795da8fe82cfa7433d1f3c2e9a4326541c5bd37f59297b94a6654a3f3146493a78ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc4d15586696086fd32d4e2a607bacfc
SHA1b018cc204b6e1c0355513056394b05129db55fdb
SHA2569923cf3906ac1c58a9fc73d7eb1cb0e4f950168a2d7130b26a598710cee9f2c8
SHA512f7f8c8efa2285d55f5aeb160ad63d37c2e4d314fd3d3e3986604a01d586b965629a88c51ed38e79c841912f0c04bfac80ce86900f39e4fbb2013ed0373da69a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f85556d0c05ca65094ae0af4bd5abeb2
SHA18d977d02a32dc565529e6f3e2946454d674f609b
SHA256ba10ce31132bc2e6b96725e0ed636aa32f9351db2b6960d90226241fabe3c1eb
SHA51261b24e0003ffe93ea0622bcf4789abe33dba2444a0df9153f1805e911dd89e060db356dee015a0367174512ce4c9affc9f607e77a6879d52b6bb72a36ce2d098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58af4727eebf384384af9079639b535ba
SHA1cb1a7d984acaa34454020767370ebba78b872b22
SHA2569eeb12fbe70cd3f598a1be53624ca76324d46292543f6da1b05504650faa5286
SHA5123e180351e60d34356170a45bdb82033dfe549eaf0d281ba92f87bb9cc9b921d28ce73122271c3e45eacd254a4702d057e743489ee73e8b75c2998e200dc0c340
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a