Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
2df8d4791aa02fa16d8eb8cf7699c70a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2df8d4791aa02fa16d8eb8cf7699c70a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2df8d4791aa02fa16d8eb8cf7699c70a_JaffaCakes118.html
-
Size
16KB
-
MD5
2df8d4791aa02fa16d8eb8cf7699c70a
-
SHA1
abaf47d1dc9ddb347068ac65ca24e1b3c0bb0a6c
-
SHA256
5908798fae2f6e347c0ae2f30d28d37adefa5ee033107fba18145b10fe0ae9d4
-
SHA512
f4ca164a6419f0ddc553705b73c8bae040a2b0fad087353c5463769a2517bac8d06a21d29dab2b152f07ea709eebb674b75601f860da66041ae81775bf31d215
-
SSDEEP
384:SI7UypLFIpuiti1jFHj7NyaRktVfVvM6NNgMZ8G1RsXCGFq:SUyuitAvNyaRyVt06HFZHpGU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421487235" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B8232B1-0E9D-11EF-84CA-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000860baf8c6ca27ee6e8bac262d0998bb9f707d06964fb5e8bc85f5609469c53f5000000000e8000000002000020000000d7e9c7c9450768ff0f2b535c8ed73d1b99c11782e67f93b62a32ff616276b66c2000000035b8b0e9e1f3fe2f4a8fec00e8228f878c984cb39726ce994c571c7a1cfd531140000000142517a7bb6f23dde6392dbfc9cf6299a3fec63eb24479c6cf425779648c0a1fd6dd858cd0fdd735f695318b2d453ea6e1440debcdb2c6b283c597fac064093d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0742718aaa2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1336 iexplore.exe 1336 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2700 1336 iexplore.exe 28 PID 1336 wrote to memory of 2700 1336 iexplore.exe 28 PID 1336 wrote to memory of 2700 1336 iexplore.exe 28 PID 1336 wrote to memory of 2700 1336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2df8d4791aa02fa16d8eb8cf7699c70a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7656ea8422654f22fea26f6eb7c380a
SHA149beba9ecfe56d2f8ce76729c5e681933eee71b9
SHA256fc71bca55c614b08788150a78d049e40a3dd6176a264a1a4340494dcb355ec46
SHA512ce185af21bbb3b97121e53be208beb42e8d1edbc4419501e35c949d5ff2be189f56bdd33779f739c29618d2c7fc095c86a4584518371e5c150008172b48c1b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e117cbbc55a1764df75c513c83836f91
SHA12c12c62e6e00a4c8749884550ffc02628a0b5931
SHA256893c28011b9eadaa5b22826c06f921f774f2d70c6b950c90b5c51ddccf3b6968
SHA51288684a32e3d42b0510317719d8b3b08ab070a5e01ab873e2cc12e0e374a946bafcb485c7ce1f2aa5252e092b7adadac3e7dcb59b17cf464c13d564e8c519467c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f5ff14fa4a40815c490a96eb32db635
SHA18375637a99036087939ba2958610578dd7221bcc
SHA2566a069555ae7c2e71436d1910de07d80e0d2a06fd05b3c44dbc8e589eea870d31
SHA51280938c1f3abb6750c56c6bd56aa5ce31135d5b5377db016031702c6a17cbe6545dae818dbe42d23670776f306ffed7fc8618b824be4cfb711c213afd2cec769c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8e269bfe824750d8c1020a63b75a34
SHA1705b97dde1fead73f5c5a6340ee09d9707a783b9
SHA25636c092b47eff97cadbe31e71bffdb3c860b3953aa99e8d066b7e4d5cc7282d9d
SHA5121df7c8e52eb15b052fbb62fe7631913622ad559f08119c33decd49b178d2a0282e5a5703de7d48eb84edba6fb05f4d01012a35508229bac5abe0f6cb8fa9dd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a86edff84889f0e71f6f93f09e3298e5
SHA1cf8c2f3093714fae6169bdedc2d9bbc57d3d7a2f
SHA25649087c2039d2c67a4942d844c2ec7f4239ce99a2b5e97c412b5f8a5f4a093641
SHA512e72bf98e9073779d061bc2877d3901d2a1181e8358f9532cf8e3968cfe307266dbd66ffa3e6f4b49cc685189afc2455a1f035751c8e89385c98c12836e885dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697814163f00dfff5296181b69efe03f
SHA115c2375a000edcce84e037678776fa56341571a8
SHA256471d1d6f57d01f487b9b019d5ba3f8120c51b986f2a8209c06dce56e8b37024f
SHA5124333be1cba382523e16e16f3bee5271bfd310aaa22ebbd4a26de16e3c48b76034baad9ce845504824996958c9a782030911b2daa636ca94710a41c063e501b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da3744db20c59fc3f5b082f94ac71a79
SHA135acba40ce4d5f79c03144913dbaff37ae5b3588
SHA256858a605f001c0cc6a46d3c3b2a4bddd3c5b5f639712ba986dec5cc0bad183013
SHA512301333143b9abf7148d429c0ad837aab7d327e8c9a1901b471ad2abd06535b7320a153c215542058464f8398717ab76060229d1647a5d0931856cc2df54f5f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5822b78ca34e30de79e9827ba2f6a7a57
SHA16689d81af88b86f4961f4d3e01410384eb6378d6
SHA256b5c3b3e275d617c8d29227f77adbc2d2435a0276d0e957cc45d3fbec32383bc9
SHA512b58a6fd01c00fba3a2440b175efb6536de823cecc0b5ff0da28433e7e3671fead6023705d66e9c4d5cb2cb8512814807d960fb40b5ae484947c2d7a4fdd782f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd1ab1b84f00e75841e3b2cac44f57f8
SHA152be9f71953aafe8db14b592cabde061328e2324
SHA256b7a1096edd780b7efed75b76c756e9964af5ab83df58aa1c3e1f0387e9d95850
SHA51275937cc88b3eb768d9ac282971b970fa5bb17ba9f036f0d2372cb16116734301e804f5ba1fc829a5a479c2bbc857cf057747150a3123439aa2d612de4f88309e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe91733856c99b4bda919caf2bfbf53d
SHA12a7ddf20b7e7a7fb3413941c83a532bc38f42848
SHA256ff13bd06cfe9b7407feb2b6c5fd90e86ee8efe16fdcd38de8791d63c0b461d49
SHA5123247e68756eb25aa65963f25a988194f88df0217f528f10f6cf87e46dec50836fd36051e5ca48a75e48ef3f678fb4ebcec683e7a5b3a7c572b0144b507209a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b28f4226345355f4140227dc29c5be0
SHA127a1fc4eac45bf96e4024b7ab5c0e805e71b1b66
SHA256c824bbd8095c5a2a9f8e75c9b31b1b878e0402454eac466a1fd120fc1f964e29
SHA51204c0ff0d8c235dfe12e499a4f19d94c336652473f88349d997577296920df6b8696feb9116e2eb52a9e50d438a9e67788a8958aa260697f8f79663f54886d8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5644fbe46ba1c4626fc8eca1bf7b2007a
SHA1ba25f49543cba09fa5545e83892f4999177b9c1f
SHA256cef63eeb02be28af54eb4d971fce51659eb684cb13a19a11198a2a4aca4c970e
SHA51296aea17bdd0eb9dea4c906935bfb4a84a934f71e41640f58c4d4136aa69cc2397472140c238d0eea8846872e5ee0ef38b6d59ffdb85a067088a57a379b506e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be8a37520d699fd1f3e55ad66b7d7dcf
SHA1d916cae29c8db6f958c8a623736f3b3057269ef8
SHA256838701bd2f02a6d0b81b0257acc31c2952091ee2988c279e47598fb92b5053a2
SHA5129548283ed8a45ee7ef1b915ac8f77401e2bdad747cd24f223c731b71978e46549e87dd5d48468ecb97250457c019f2805b36c03c5e5c9356bc3deddb3f3536e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c420eb89a5341d1a32431faaed7558
SHA1c037375f36e107147daf31f393f02afefa550f59
SHA25603503e16e681f8e3701532db4db87011f3b4b882fc2d5364f9d081a155d7a638
SHA5126bfc7d63712b45ac1160656d94a7fcd297d229d90e11433e5ff06410360433c4e733dab2577796522187bc7f211fa59a85e6d4682ab4d3f9db04b93582071f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c521dbe33c6e341f69599b4f9dccee
SHA126e536c927e05df18b5b07a94db6fdd6faa33a7f
SHA256e577292b1ed3e34b55fae9b90bb6136036a77f9db00c87053156b4658fa8e338
SHA51221cefe527153b855941fb8b443520989931ae107dbba30bcb9eac12a2426d9aaa8951fb04e8482d1d162a8358cd6fe6f6e2af9f2694106d6566ccc365e846916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f5935cbea8497bfef6eb65d23878a81
SHA11f38ed2c99bc9bd0cf75e7fb38092a86a51f076c
SHA256f677b811f4b32fcd99cc8934bad15b70a68b65488d81a8fbc56ad84654bc2694
SHA51276bafdf8fcb2efb8aac4670590c70b638812e7fe7463a03586e53bf38230f29ed310037c271a37824aa86dad2593d04fee0d82eb43b0d0e83d6b594d0f69c5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f79ed2584f7de083fc7fb742d53f10b
SHA14521308e09b8248030c55ecb4262f440f141bcef
SHA2569971dc46723a149b48a51d5ed66ecd12f2d11305da0cbd28793274ec15e9d574
SHA5122b3349e87a7d96338dbbe8fa859225dc646f310bc706730c020ff6ac5318fb3ce1f6094aadc87d9105fc5466a7a5d8be794e81d5e4e3e03e656529f39c4bf282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fc649c8528d916fead749b865afc33e
SHA1499fcf8f4233f5746c933547a6265941609f3d51
SHA2561898f5984b11e1da37cb1fe3ad15ffcdb9bd2edb822a1fab11cfa53c7f12d4c6
SHA512267d8de612c0ae7ed94207583561efc38c381ad662ec8adf444bad6614af65b15eeba9ff03e40593783b4fb21eb8d4af8a48a5ddf2ba901bbcf1aa397cfdfe1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5819b6d82fe2a92d0a5520c48dda15783
SHA1a2e1857588cf2f5f7cb6a9d4a993271241c2587c
SHA25603ce935719af4da59981374edb23d5deffda1330ba7f880b5d189fdef2691d79
SHA5121afc21da1353042b1cc306637efaf807ebb90d5dab91c97087e98f853c463aa25e7954b3a643a117e7d0b7f824a89017825d1fc8068339bf684a7f665f705d8e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a