Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 09:47
Static task
static1
Behavioral task
behavioral1
Sample
2e881572147df28c8313ab07e50b3974_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2e881572147df28c8313ab07e50b3974_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2e881572147df28c8313ab07e50b3974_JaffaCakes118.html
-
Size
70KB
-
MD5
2e881572147df28c8313ab07e50b3974
-
SHA1
2b00cab32ad10c8cc38b6730d647b73e0a7a8a85
-
SHA256
16310ba81291772192b9f740bf4b5c6fc3711a1e22bbc6c1805c5adc24abbccb
-
SHA512
9531b416da64c99e3e64bf0bd413f2da75bba7fd6eb0dbb3e276fb73a83bc6c0e6da206305fcd29dafe868c36310710d3ea4a03aa4a95fc0273c1c0c788baed7
-
SSDEEP
768:JiggcMWR3sI2PDDnd0g65D0fUNoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVGQ:JkrTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421496292" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f97f16bfa2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000b7158cdf3d12470a1774ab898abbebec6e3c38217b7f0b75aad44d2a3d5bd545000000000e80000000020000200000004f761f57c85050f97f3e4861266e903eae16ddac3eba3983ae46a59878a5fd4320000000a5702b74934c070b3b7c2b52ca2c5f32b22ba18c62349d4f3ab590ed45773b55400000008a9c100a6861f21e24ffddaab33d81626b0af41142da37fa0f28718b59ce2b0cddc9f11b604998be8a59bf037112f8188f4e8ec196a4677f00fac52d2e178807 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41D5AA01-0EB2-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2836 2968 iexplore.exe 28 PID 2968 wrote to memory of 2836 2968 iexplore.exe 28 PID 2968 wrote to memory of 2836 2968 iexplore.exe 28 PID 2968 wrote to memory of 2836 2968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e881572147df28c8313ab07e50b3974_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f2ac557702fd0e1df20910b216a06dd
SHA19e384e098779dfb27033584f103a6820e28de104
SHA256a15958c5776dac7c4c2b99710ccf8b82db9c145e3c15db9d0da4d383455fd156
SHA5129de8a2388442d1916a818319b7f9faa61dcf12520679e4e07b0d8578aaa9757dbef572a9aac5484dc14fb3baff9aab6ee3c1858247613ef18c1f3b47a7338741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561a21726121adf63383abba93130a3b6
SHA15fa85e7cb5936351a4d2558b15fd400fe383b274
SHA256a2c7f23cdc0e07112fe5c4b4540861edef05ed243c516255b8f5858e2a0729ff
SHA512a8bdcd09eaaa3d9295a33cdac231ebcfa59a5183f6efd90f9ce464eeeaba34758055777b93cbb0091fec359f6f7d64ebfbef9f49a71c0906334a72a9f7d16639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e4c68ec92975e569cffb5a86a52af9
SHA16f864517693bc6a444fd38e3373cc48f2f0a908d
SHA256c66edbe672f0ef0f0e9eb1d301d900cf9050e15fdd814510a9aced671ca48484
SHA51258529fc5ccdc0d3cd300da76ef73a9378094d60c44d9d81556440c75fe873e857c6bb37daf02ee15dae4d11d9627154ed94dd8ceba9d859f90a19be5bc642c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbeceadcbbfd622c13aac065d7ad3f75
SHA19cffbe880d3d7b1a01eaa67c1520c6ec3ec0b135
SHA25604a9571116b49cad83580b565719120e827363c9d85ce067c54a38f73a9e4ad8
SHA512e3ba80df5a6144c650198081c91359187609053be66784fa8142a08c3a49ba0d7c14a49a7fc983d36dfb62ac4f365990947df3850e606c202fa72a9530b5c4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5935a4283cc22b2884466d70e2207d22e
SHA1da3ee0db6808f9e273a47a267d5cd2f32167c7bd
SHA2564f95ba420509427a57836401c561588ceadc240c7410692aae093b99c80388d5
SHA5125f9aed1ae27736fe6d820c7843666e5633e0c71ea3daa15b5e262ef6ea9c4b718ddb3a75afb8fa9dc03d420b90d6ec584dd0260a480539c1228554c65d7ce0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a90c6083abd116c73a85ab12cac553
SHA14000674e095a185b8abbe5a233e318b546f73ec1
SHA25601663abdfe9dde64004707c3f243c3d931d3a1f3490ce3c2fb62003f416d91d3
SHA5127a2081c28aca25396ddc9d893f4b312359ea3bfe875aef1a3fca498d357595765ee171f86e8b97324427447b0f8876a332d376f957ad3b1b5e976e41e699040b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d3251bdb106632f9641e0306c24e424
SHA10ccbd482b7ef78088458414a75792f5d2886535d
SHA256ef67c84d1fc3cbf516dfbd739d6e4a729bd8b7fcf55c721e1a33331b1188a1cf
SHA5120c8a12aeb706e2576e1c2be7bcd99a9d7ab1ccdc9c005cc1e9aa4348dca7c95bc8a26462c07ba40951955a7b272f073013552152e5210e9559e558e93f9ee52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f52188df12fa02181af941bf54dcfc55
SHA1e5d0741e9e9f3041dd6d83127470502f40d60858
SHA25643acc4ef531a2ee5a6f4f99abc6c17ffa28a7e93b81918490eb9f3c25c679fde
SHA512f4430cf3e92dda9fcb2bd3b3e1f57fdf0938c32aa0caae409f547a5889eb53a7112d84f155236f19fc9d1b92904e1356df1179efc124ae8cb4d8f3c2a3caeeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ae57ea6f15332defa768cdc68ddb71e
SHA1ba6acd0058cf4a887975a451fd02e6750607776a
SHA2562cb85ace91cfa282e018cb813bb5ce2b985fd20b3c1cfd1754598b05dd85eb7c
SHA512f9700bd167009880fb1b0857457f8dbfa836cd35112cdcf66d920aa1d21484407ac250f48f72d85eb735d7a17ecac3d42214e08a5d11c4b85d78e6ed25a865f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cdf1f58f95af60c8ccf47774106b2e2
SHA1a327ca3e3a18cbd624cc9114ac0e3164c7859d6b
SHA2560792379cd132b53a72a4e8c11ab7f8ba031ed24f4728d7e1034783a01778dd7d
SHA512d6e913de0ee506eafed14d10640d0b3934a26dd05adc442c71e6de26d4d0c62cf986ffb51f0009f09e1bf423e142ebb995c105d5f173410f43cb8ad796caf795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bead82f27f311726dfef5d4de9ca196b
SHA1daaf114e5ba017bb0d9f248c898b7d690f1f01d9
SHA256bd3d6bc4544267499d81656eb2a9a7c04814eb81288c1fc7726d2b7e9d3ccd85
SHA512e6ca6200756a7cdf0921c7fb1ee3778ea9b165932231711faffcddc3cdea3e2e42a7b6d0d0806665eb4dc8b672cdba481a287bbbdea5b63bac2a9a78138b1b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63f0fc29cba0d91cc3dd0ad60633f6b
SHA1d130773928610800258155c9e2a850c4b1caf1be
SHA256a0346127843f7b6a5acd6cf2fee27085cf47bfade27cb5c2ee703cb2762005d4
SHA5124b21e69420d5c41488cec4aed768f7b2d08c48615d6dd33ead48715c9f655c04ed55c98a1337ccd02903fea87d04beed24c5f8cb52f816136bf4638d378c409f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df03f0410f4061a3ee5e7c6039e294a2
SHA10c571d04914c0c444f33a1623f9a2d2e4ef57bcd
SHA25600491790a950dc058a03b910e6af5ab31790aa71f2d2144176d8a75dc2bc1280
SHA5126f7d2ebabba2f3c13f4e48ad4c2c980862cdf2b7cbd843037346f15ca6cba5ab0ccb2e2bd38e4a49587cc488ba187da8a8afbb443213cda4c35c63c0e6e6a193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaba87631dd1ee531673acc71ac871ee
SHA1e3f9eeb84709403e8ed15094f27262dcb8228c94
SHA2568004bdfa82b0d6b8ad4f5268627f8408fce1fbc3a20fe7927cc31ce1054ef027
SHA5121f07dbf5b6a327a5b24215f9eddc36671bbd07004841a999e121bf0113e1dc6f99600bf27e5bb18ddaf3fa99b147b3bd2cffe9666fe702bb58fb054251963af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ab0666170d1ea16b3b52fa37c9d938f
SHA190597f8bab4981e6e40eb1c4a70926bd82196d08
SHA2569f002ab7f1c82f76934e7605b6e51dd882947d1c3567054282ecf4943e53e79b
SHA5126bf2d176bd4fa39b6e805da3f3bc246d88d67ad977421f6e73c3fb9aa1b79e7d43742dcf99ea5d91c25effb87fb6945e705da26c0198b45ce3d93fc1e25d083d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1203ec799bc76672216647201a23138
SHA1c9d468819c053a13f4423182fe6135557105a9b3
SHA2567e43ceca9831408c18e65c2903de28de0b617e36bdcb2aa221e34c08887e717e
SHA512c6bdb120f47d9f8a4658034e8b6727b2ec1cb3929c0d2a9595bd79d4452ea6bb4cb7224240cfa88f6e2a3c20576c8e8a2f476691d1c24e4ffb79046e3aeaf0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558d2083e65572e33c4071dee8f25a106
SHA1f43a5f960ad4b01475c4063ef47cc3f4f330156c
SHA2561ed3675c885a02815bbb78cf648f6ad894375d983d36edd81fb370c17f621831
SHA512991ecb7e91c225e2cb68cbac061f920d23320f76a75d9201b7ee43ba4fedd336c7560580dbb0204d5f6a9e2291e35b0a30534164965fe94e21266b9b3a94ea59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5851dd020a27430585836f673f4bdd391
SHA130184b87443ede4740831fe0384b5dd3ee380167
SHA2563bca2e52ea365ab19c96aae7049868670cc6f5db93b2e36d3ff173c82b898610
SHA51285bab5df3f97bf7d35af62300e220e3e4706d0878264d2aaa013c300b5c7d691ce462edf63e379af62ed89490202736dd2e4149463564734d2086333bfbbdf2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5540bd05b469ff4f0e995f39d23ab1945
SHA1538624996bd59035cf2752c46e2256d1215c09f4
SHA256ea6486318252b126334ec70d292772bfc1eb8e854d5b03b205984b85b4f7b027
SHA51257e5ebc9a4314bed19b4a59a1adf5fe0affa8488d7876830a74561a57a3affc1a0ac10e21c4d7416efbd0a79cfb439c7c795421ca8613ab1d7ce2b7eabaee855
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a