Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
2e242c19ccfb4d354e0be86580157f73_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2e242c19ccfb4d354e0be86580157f73_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2e242c19ccfb4d354e0be86580157f73_JaffaCakes118.html
-
Size
18KB
-
MD5
2e242c19ccfb4d354e0be86580157f73
-
SHA1
53aa011b895f75a0540c65315f96fd7ad13d103a
-
SHA256
8c3ae806c2cd8c24e3a7b6f2ff4933a29ba207de0449fd8adc5967f801d233b0
-
SHA512
d9d8011d3893b9ef335a61e347ae5ed434ab1982fef890f607ac316ea8533978d0a8c672974ff5d102cf1126962e5958d9f65f1e0a628fc4432536700a5a3fbe
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAITQ88aQ4KyCqUGTc5JzUnjBhSNaf82qDB8:SIMd0I5nO9HZsv0txDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421490137" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000f425a2df48ed88189075d422c8aadef6a249d3aded4f866a91381eb4deaa4296000000000e8000000002000020000000689b6641cead22180561e1c084df45765a71f6a279d9b2fbd54ffa09cab20bc920000000512c957744d45ace7652aba6e7485a0169d277fc58bff1df27d277f8898e4c894000000037d95f0b55fb8fc360dba6a4f857838a9b1f3f1fa39d850f522aa08882709a640f2fa8f1bea7f378703d75c11773606b92fb554cebf5bb2b80dd8fd2fcb62b2c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBF16A61-0EA3-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30702604b1a2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3000 2648 iexplore.exe 28 PID 2648 wrote to memory of 3000 2648 iexplore.exe 28 PID 2648 wrote to memory of 3000 2648 iexplore.exe 28 PID 2648 wrote to memory of 3000 2648 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e242c19ccfb4d354e0be86580157f73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c92c0dadd76034774cec48fb83f0941a
SHA153742887726329f0227ed651131cce96fbf425c0
SHA25661a9586adc52a4ee398ac8228c95afa9595537c73a82f05219e6bb24f9aadc5f
SHA5129123ad7937a047703dbf37a57e7190f8eb7be3de0db63e1fd8c188d0afabee4b8b88dcc87b5f8686365d24bb5ec437625588f96bfa378b75f619b24a23dfe05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58758c461c1fd8f1311445a04e3db8f88
SHA1c9f7e9ab43dd0b186865e1d2c7db0702212b8e1f
SHA256e7e08572d03de14dee050d1b1d1228ed44f0e94a4587397abeb930a73a3676f6
SHA51294e43d42b6f2e9a7458c21353c2894a967c4426f4cdbef1c744188547642aee444cd3f41c502d0498791306476a02c2e204cde6842fa6044cc277dde370b5e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f4412a95095a4f37d3d7b9b343c55b6
SHA1fc6b4ac80d43db8430cc9027fb610406ed564b5b
SHA25664e5dada99116698b5e2793205b5ddc60de93c9e4bca7c3c5afd69fe3229863c
SHA512cac2060845a6b34b6e8d47f2992f52b95dd4a93aed7a2ca77742ffb22983495795504002e7a9daa8c93056f7fc614e0d454ae69570cea60842897799cfe9730b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c96bf6dbb3d0f941fd4b43d9029b30e2
SHA10f664b263c4d6c61080b3a311b0decf705f75e04
SHA2564dcbc5e69fd8cb69b1d96f12877c04fdc8053af428a852ded58291b4bf0f4d9b
SHA5122a03d11e7a0d09970c9abc3f4184f8f13ca8caf3c4130830be1a30c89654727c03a0d933e2ed5ca7f1061f1f941c941825145581445095093965499a1bbfab0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffff63a4805353dc0bdcdf6f8a693176
SHA1030a03df8c91a7e695a155a20cde930905f7c9bd
SHA256a753f0a9528893227b88748e55e6aba9ca408506b152a4bf998bcabca28c736d
SHA51223a9a6c61694c5244f7b22beae911cf38887f3da4a972a5f0dbf8fb9ea7bbc88f2387b8128bbc1cdf35abf6438caff112ecb6c7f2f1bef48ecb56800792e567e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592afc81fd4d11fd0a36339777d8f782e
SHA18761b1e62cc8f49c53c3a6af2e4ecec0828ace57
SHA25618958c45b15a04aca02bfce67c77140a1ac2fafd7de547ed56be9661b0412f1f
SHA5128ded91639d432de543c2a61d3d93649a6f3d7b3881d77516176302527df592e475a21b8cc352227fe465b7514cd2d365fb19d06a5e0e3e150eb8a1bb3c13ca4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc85555dc8a5492cc17311b56a006688
SHA103ffb3d4d8c5d041b64c2b8a2b0cf4b292c8703a
SHA2562cfe5df58d73a58551520eccbf72f1be415fc3e5b0aa0508e9d9db57c9ff4c55
SHA5120a6b7c943b7aa593b9b02a5407277953008b4ac7d911cd4056a71d5c1f6bb92463030f044b1d9555e17fac7bfa77c965959d432012426b57af3da50b7c8576ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d8d5735357df48aad89d527de994f4c
SHA16fde24b93d5160ab9af925d45aad8c2d17fa5f06
SHA256e278de90cea0a036eacb65ccb9010163763a347c66fcb8ef3c6d6df14a893754
SHA512c77be034cad96a72bf14bad8d7f0a06b29ad20dd13e29b05f81e4024a3ab9872488ba467d9a748417e1ab6e8e74948364e8de1b8af9ece5cec458ad24b2f3237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ad67cc668f86434eaab770f74e22693
SHA1d86c5f9fe612c1acbc33446fd2060d8437da5958
SHA25614481f24e411aec09af1f78d12de89ff829bb8dc3c573713b7e5f0eaf6ccbac9
SHA51226896e3a0aa4bbcec6667c308f49a57c7043438e3225e6b4daeaf9ccbfc84b33e6cda9cf8bc014a3a27508cda5e8727b2b0fa7a06e76e4709a044ed13a92a5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b02cd834fa69f2a1fa6bde859310a6a7
SHA1a0dc0bb8b375f3ef41e7f99235db3e6376eb5131
SHA256ab4f1f683a87bf71458189352985a3cd3debd819db8b3ec822b1a3b2f46fa1b2
SHA5128d55b6a452e6ca2bca177230b7b2089c7c2a028cc46858d12263f3439656fd4961f326c4fde99f8fb71cdf3d521a04ce5133b89e94ac2777e09c098eddb0010d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97539afb6ca0588b795ca3ad29efe1d
SHA1a8e52bc59e8b2521c99a712000d7db24a0b08fe0
SHA256bee03a49e6029880e690fcd570a2dc0045350c792b1f0f2decb732647dcd9c61
SHA512ae5b59f4dae52663c475115eb64ce2d9dd910868c3fc860f481143a6003435691c80a778b796a836c6800d258a641e61efe3f093a405cad57c545addb46a5186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f9fa5c8ebce91a9db0c599a32c8c02c
SHA166887882a0ccba6bbd3e93db77e302ac55a5bd9a
SHA256ee1dccf88ed6e8e8b360bf0a07a018c07cb72ce8f8c5bcf82f43f582ab6c2086
SHA512d5fd87e476623f8b1eaecde96b707cfde774190dcca7175efc9901ed74c3e4be471978f4792936ac4b57ed32e339cd6000572363fd8a826f0ad53138daa88dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a1ae65e5e96eb324a2329d63834e38d
SHA1cd08cfe5cc9fed95fb5e7076a80272775fe4d966
SHA256dfaffd6148293dd38ef76d2269a275e56bf67bcd7816d2eb22fff6083e76dd1b
SHA5122da458297d61e32a5d21b62e517395c8a695035867eb230edbd52a89519e263b5851959101057fc68a3d18d7fd6a584951c88258f523995438c0ec25f0a286ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c57c78a5e6df2c427f94b28b8eb4ba
SHA169840957fe6096cdac2fcb44aef8837c74ff4f1f
SHA25644690c39341c5a4e31b9d3662e9fc0fea6c6d721830185b91473b52c9c665256
SHA512df2213895f25a56fa671ba40df8a7ca452ecedd3fc0e4a8732f44007bfab104a52359cbaf58b5d02757e269c912143a76dc765349d16473041579d992f4f8dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585fe957692263d29adfc0a4c7dc6e31f
SHA1a43d328782d8efafe2aa10f13b17646138b9e621
SHA256027594ef02ec18c8f43ad2c7b94d6ed88705046be7747a0a1a219b532bf5dddd
SHA512c0a17847742545f832b44ea9377a9a49c399563ad9d967d7665ecd45dec6d002a199271a11d59e89c5f0c5665e8333ab2647db36ceb6262aff9b8d4265bc0e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ca543338b6f5400719135368956388
SHA1a706a427a46fe8f89b0ecb16b0bf30794bad358f
SHA2564b3bdeb67eaca1573bf3bdce2197a51bc80eb6b41b15497bacdf99794d50eee0
SHA512dda7934ec4c1c777d7d6b3bc4b3f34777f32f1d65ee542ed8fa96f907a10d3fc11c7b7f5f3f98d6baece1f518f04f55414652a79b014d6717002b7749a476904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526e8675e9f190e76c87376d2a35b173a
SHA1bd181b7f5f2c0b400de3737aebd2282e115d1a0e
SHA256b215f0c8be21099e962f1895f059bcf5a2316ee0ba54449a414d770c0422d69f
SHA512673a43eaf04b8fc923cb206d17acc231f9f15386bee7eddbf561029723c09b62236de728ad667b5d48c44a624fd87b011c2a10c524aefc44c9a9f0608ef0ad17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697973fcd2bdf6c8599cecb2a5ea11f0
SHA1c0c42e3a8e4a519c1700e703329d9e8ffae04f2c
SHA25626b303d877f6dd1e5e7ce1f3cb329d46b3769eb9e7e6e2b7cd8252e3a7269751
SHA512393abbefb625adf0e46f3d38f795a2b5b3c36685ba7f2b5be209261e3eae17723755f65649b2acaa8a9b7b3c0d20bffe68b8db12e34bd152df7df72eef74610c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a12ca0e9f65112a42038851bdb27bf
SHA167463da92032e84cfbe8593d4b4efd8b11ed0944
SHA256554fd8f7cf441e662d710c63a19dd01520b440aae04013960755dcbbff22bd5c
SHA512a6762f7897b90f1f3f5a59a4c4ada0bc2abdfc89570a047a3be5066da65e796c62c7b04d77fa557321bcdee4bdcdf07b32103bf961c006bb9467cc211efc5168
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a