Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 07:25
Static task
static1
Behavioral task
behavioral1
Sample
2e018106638be082fc14d76753c2b691_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2e018106638be082fc14d76753c2b691_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2e018106638be082fc14d76753c2b691_JaffaCakes118.html
-
Size
27KB
-
MD5
2e018106638be082fc14d76753c2b691
-
SHA1
d1f400a2c718ad5fad8fc734a8739e03e7c46028
-
SHA256
a694cd63b80775035805d7a2169d37e15f4c76257494f6e92a6220a9a5797f67
-
SHA512
51b5d77060c066879d6a5e12f63300a128cd3756d17555e907ad9d30375e9401ee1813e10614fb15ec8218a8e08e4ceba3292f186cec23de4f6a58eac391c952
-
SSDEEP
768:e2riIuWNlH3Uw2riI7GMmB5sXzeppuuPuaz5kOOY6T3azuJ5K:e2G2lv2GuGMusX2zuJ5K
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e1fe57aba2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{822B1591-0E9E-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e899489a994c5d8030bef5ab63b41b2730bc924ec20c0e343ce3200139eab423000000000e80000000020000200000003e931fab4f623553478ad8d9c913b7e8661a383f7542ebf3e3d861ccdbe798432000000054ebb5c04a6581c53e7cc21bcbc5ace86c40bf61ab0eef8891143cda61c3705b40000000e97104264b4b3f9577dfe7ead5a5345f4466b1645f67947e6a509f9305502074da1178d369ae9508212a3bf292eaf8adf52527b356f1a4f72c0a0af03f3583cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421487809" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 848 2232 iexplore.exe 28 PID 2232 wrote to memory of 848 2232 iexplore.exe 28 PID 2232 wrote to memory of 848 2232 iexplore.exe 28 PID 2232 wrote to memory of 848 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e018106638be082fc14d76753c2b691_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d3d584caa919542dffab2e27c97450
SHA1113b0418d6e0653250f296066b7f875ed3c89614
SHA2560d9809df3c209061fea5cfde04b533f2cce9919959a5be35f22afd37c5a1e297
SHA512e2ffefae9d88c6b824d82815036d51bb97019c0a01b60ecfd4d98f52978f0009251cfa8c1876c6be7e3d07610c21de17c223f01d8aa42d3f8775fce2d8a9fc20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553f06de8a0ec2b84c90e7cbf737af902
SHA16aa47d25ff38b66c6983b3de7e7873c0fe4473d4
SHA2566af31ef34b06397b0ca9a7ab7c47281bdf8892d2c34d96736abfb789d7f49e75
SHA51253535ba1f63a6b2f3bff256d107454c4d3e6c030bd993c73722e78b82c80edc19b4ffca537855ef13dee9ec788c08a018cecbcb1cf1befccf76d11101c92cf48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57426971a0b7ac8ccabafff45c4eac786
SHA184f1579f22692305adaa29c40da8afdb8160074d
SHA256d38635c1c187e8f20e359d49c7252b478454e59025dd8bcb5500e4feeabcfca4
SHA5121eeecec86906b867be3a2cd1c45d43203f3baa532e22d70e9f8803426d37be95deccab6820d7c166307c3eb5d4693cce2a6ddfdf30b348f6823dd98ff6393457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c12a38174f90737123765d204d4a95b2
SHA1c18023c6d5937729faebee73f9d29dc19df38cd8
SHA2563c12e0cc1a2fe44121b08dc808d34fb904b38d80dbf9278f445a038b4d78f49a
SHA51287dc2241dc347c1f1e5af4ec53da5f5b0a090458d9de1cdbb003782e7e5e9840293547991c40f5bfce5c27d6b9d2465e3ce513a10c15fea95c1d88dedc92ed3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cd2f3f75c48c7840e4f12171d85b5c5
SHA1586faa7135857b45fe07c074d33b77960af1d745
SHA256e09b717f558ccae0a103a5675a0ecb510dbca8ee8079fb679bbdbb9a2b9e9f12
SHA512925aeeca25bca680a45de1883c9e509b70147d46b85b69a8accfc719a885207c59d4e93cc8447c5ae83ef9481c93cb4f4f4aa31722dd1fac367fa1b699496ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be336de20f2f711f2bd2991b0cb0f074
SHA15281cf8b4f0cd4b796db37b34d31ee13d26875fc
SHA2569883e6a2b30272b2490a69f245ae0b79a59eef147960733934381611b3084d47
SHA5122a7b8a2c67cbce7ae5245e833c7b22bef4821ca7961760b43ab4db3da75fc08b97f95617aeaab176eef976bfee363a0136da15bb4934cfcb40707bfa703c447a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81f2d4f00797ec3c5039010792dda24
SHA1ae68b86776d0d1cbfb85c12f62735275c383ec4c
SHA256a1867d5dd9371a4fe362f804c56c4063430038b60597eab095f7eac0249bd2f2
SHA512e633f20d0ed8a4c5d47347bba06304085c096a9d12fdb560d20a9d6b191cbdc5799b0cf59e433815b30d40d4bea6bdd7d3e0519281fa77e549927ab4bd18efaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5946b142817a2500402456e7f7c41630b
SHA1f4f4f559600725a40a3506970dea7e87bdcdab85
SHA256da4479cbd0f67b45f4604de259b070393f294356d3494cd4cb51506aeadfa76c
SHA512d7ee2f42b5e9bcfe51b85b7b434c358cbb838bb7be4a328be332c993861233c4fdcea201a954cbdd1ae43cf13527e65e65ebfe783081561f340daedf45b0b109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fddf9474b8b6501082f2ff0b722c558b
SHA1b6f84b1098b839824db3c968791cc9ce481f590f
SHA25659667a2dc6604bd26e8e1d43654107fa25c1c94cdaad9d0b2608bd16dab31040
SHA512b53389dc79084a1e03fb72e1d0fe06d328bfb410e22e33988577549a1ab404e64d2625557f0ad7bd3b653238532318a8ca417d185fca86dbef572011d98dfd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53de5d39f6c289a4c51f2f1e537894d18
SHA10d096a94eb3379a40e1be1c4697a6ba0363f9ac7
SHA25627cb9b5c653a8356742a830003af083edf7741b139c3c575ec6515d87f87da07
SHA5125254884356de0684610433d89c44dc13d0dc59620404998ac0a28b319d51a055ed246dc86d46123972b81187b446d0d3e9cc43a325d1c2367a36f85399c71dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f18b41f1c40539873c35dc0b23aa9522
SHA168aaac61066c4242363be3623d4a322c8891cae1
SHA256d94ecc47ea0a6bb829c04dbe53c7a6ba79f948f94964dfc3111407744da8d90e
SHA5120783cfbf5298d59a61f5ad3340d6d9b470f5ad4bf6df65e68e09ff5a56fea0abb1c0eb4397029bc522eaeeaa0ca4ebecbafd1323616d53f0ff5e1c0520b412b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53899895bb75252803cba9fc28035ed33
SHA186d6283a91afe02aab413db8f28dc5777ac4609d
SHA256e4e3d73148029f1d5f65e8c5b2094af217c40e2fefccdd4d3002339945099d6d
SHA5120aaa6d2b0d42fed99ecb82fc036b8648e76013e10aaeb56d388cdaa432cb3e15c3668d73cd502a0f60b17be9b02eea67fa241f4f2bbbc5cb097e4122a897139e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeb6636061d535241516f9577ed30e18
SHA1ae9e88efd754d405f3add04b951fc634aa2ba67a
SHA2560228e2dd1bd8c3f8f42ff000919659c587eecedd6d6f5cb16f00eeac0f35d141
SHA5121a4029dac1be3941bf639969a58b1f45cf9efcdc221c8e636fd086d6fd487173d3f2de8e9cfafbba00a0e7c56c69f75f78003fa084f2edcda038d727a294cdb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5461210ae4f438d77774232013cf12469
SHA10e45c81bc103d9a236c6e046d8242a1bce7e8df5
SHA256a20ebc75736f095da87cd2386fb020cdf08c982eb4181d016a79610000b21ea8
SHA5125ca54baa12a4032cca92e370ed2c90b5540c011a357d35930fed0e132ef0d04d7431a7b5d1b10c2802dc22bf2165bef4873ce1e77f0522ba69c9d78ce94a38c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a227c3241e5b91c3fda709a4476e519
SHA1ac028e952715e6ac3027657ba9fe844e0e094831
SHA256926036ccc70f1cfc732abb3e85b618f730412a3494d7a38878242dbd7b9c52c1
SHA512ad4976a0961221d7a86db63c339bab49f5f6f12020ae5450a7092c7c044cf669d1163a9eadd9fb889dd10eba472b4f0978f2dc9a296aad82a5fe69ea0225a007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a36ea05f3c44aae3b3dc7892cbd5573
SHA1aaf9272b50965275b40ed7f7ff5fb8e2ba3164d8
SHA256015b1518cfa6b3a06852d8c8b7f7f76e58cd397862f1cdacec4fa4df8dfe14df
SHA512b4328c797bd0cdc648a0a5770dbe82da51c762cb526ed92c2ec10174d2019c6b6f9d7451d37dcbfed6cb3085773a350fe30bfe612a3d2c78d1f5811fedd59b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dafb904913c48460cb26648e38f29f0
SHA1c9a65857dfd5f560fc537727508047e5fb181674
SHA25681b9f29abde0a74cab9aa14b68d29b19a5134bc8cff34b0a83b2971068eeaf45
SHA512b0267aafbcb4ac708077016d99a80bc25731eb643d1db0f907ff06520069e966e9c6d816b722f3d40f6a07c37db1467cd86add4475876f3063176ee9c627d1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d52a924405608ea999460fbd005008da
SHA11d8926abbbfefebf72fd595a80defbab17b4834b
SHA2566711765a3318e3fa215e2debd6fa975278683981d87d5dad2836d18fb9f849bf
SHA5129914e900399078d6f43b2a12ef5f119329dbdca673a6be97626eaf2895cdc9957befe59e7f642b401de15390ad27db2dc67dcef36473034577de3b3b8f07d244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5203f62cee7a28fbbd0bb72939b4c102d
SHA113f059e284885b4f65e1e7f59fb9574cf3447034
SHA256f29b02c1e6bfca8f7a02c61546c63fa702dcb27abb0ea0232c92a1b1d95e0736
SHA512efd8e26ba40b231554cd77dc758181c283b7245d46d8f0d398ec0344e1fec70af8f161772caa2062514ee595f2e2d0c4d59ba42d9b6797bcf5f495fb33bed212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5988b8eb063632185a5d3a3d929bcb08a
SHA1dc21848a3ee5ced28765f4869c811dc414acb922
SHA256f9f915216ae790eed1abd65369593e736b666aa81ea96c2a430f155a77264251
SHA512e8e223bf84dc117300951006e61eb9e9c383e12287c2937f01dbd51830bb7998efa9090ba10c42f594b9a02d6ae2081c68f37cbcb1aebaafaf0375a978a65630
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a