Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
2f0efcb591a3b9adcc514dd9933e4100_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f0efcb591a3b9adcc514dd9933e4100_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2f0efcb591a3b9adcc514dd9933e4100_JaffaCakes118.html
-
Size
4KB
-
MD5
2f0efcb591a3b9adcc514dd9933e4100
-
SHA1
fd9e31823b1a0c04206d068d3a3e8dd4a53721d0
-
SHA256
b566c038a91898195fad0171aed851fa36f148f84de62c074bacb3fd83c75d0a
-
SHA512
68d805d976413417b1c8087d9cc07ef0fe335bcd80858fc26bd2f03367896ccf364edc0857cd8823f3c22966da883a9df23fcc353b4a3b8026267918b32f2f88
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oI6m6d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{844F8F31-0EC7-11EF-9960-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421505424" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ed8b59d4a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000008dbe68f1607475b7a6cf86d2e5289cd9474cf083c8852d324b35f76b5cefb814000000000e8000000002000020000000667279103724045fe869062e4b6b797e3eeeb031bcee372323bda1024e1ba2d820000000e53663ec964c6290dab4b76079c8305832fb6ef089fe98cf9affd53962c5c80f40000000ec54072918b417e0d2576b07c98b9a7976339a0226265cbcc953fc31629fd41748fdc5f75f10c6e9a2c1e892dc73f60ee539138be874525ee8f343a0e33a22fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1368 iexplore.exe 1368 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2828 1368 iexplore.exe 28 PID 1368 wrote to memory of 2828 1368 iexplore.exe 28 PID 1368 wrote to memory of 2828 1368 iexplore.exe 28 PID 1368 wrote to memory of 2828 1368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f0efcb591a3b9adcc514dd9933e4100_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecd61cf5cd87eb4423864b97ddc62c04
SHA154a3b090d16a6b7f6826ebb8cce4e2b3e460a8be
SHA256c90df5eeb9b4158a7e611fb9ffc8e3075448a21a076eec717ad49f89bf918ad6
SHA5120eea1bf2f972f4260ba80dc72aa2cb3be04ca8d94dd72540b2c17df6e276cc5d4b89094241e7d09b55402ca0bd60889aecac946ee3b961a13fbd9ef4d193b90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556e9d45e4e111e35bf557b842d71d310
SHA1c4d8f292cedf963af499bea94d92635092061134
SHA25680af8bcb475b0bf7991fa70cb85214f6c7536f003131394b6ca376e88eb9ff58
SHA5129e2f610d93f81321180104202b222069fe87ebfb4742bc421f567d26e1c070102b3607ce0c47473ab8783c617d38059ab83e6b77b070e5e8c13809490bd83ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586b2a62b6e506bb3c11ce869610b3b5a
SHA10b9ad06b73b03746b145a373720bb737a754edaf
SHA256958fc0f9cf089b3af891e6bff147edd666876f8db2e3dbe14b2c0c4f946e2331
SHA51295f736e3fcb8f4faa1ac180efc5bf923d52b1b7f832c3d7f7baea6ef6160e4c048fc1d2e281251cd435f3826b187bb61b56d1addb26607a4b5c71616c54bf20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5571c2794188cc9d927aa7f8489301694
SHA154fcd0c07fabde4e302fdf922566deb588839a8a
SHA25604a401da1bd10d36a9a8ffa2cf097bc2b07522fae6a95103acea1785f4263d47
SHA512f7164702b6d4c705bc771bba4a9518658bf028953716b3ff4efc8f53c233438c534b0f77a8e3676a38a9175ea7891955b2f6469fcb4a22a8aae8e3175dfd6ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574b6df42082d8cbab3fea82e88b9c404
SHA1eade01795e9ab6af3f82b50ff1f0e17867f8cccd
SHA25602a57a4ddaa241b8c90b1769f4be1607b258c5c3b296bc1e3b92e9ea0a59a690
SHA512c5de1b4bcc410a7e95b587087d20d1d45a8592288d3038159538fa5ec5699a34cca52bb4473b39fc858568322fe08bb211bf9e44fd9ec8d0070bb590e0f14952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d38165a18a761aa0a21bb91d491e5cca
SHA10891e11397b1e5b848afd7fa1d6de994dcbdfa83
SHA256c4e68af8b31015cded4eabba07b086c2be0f7083c95e7bddd9e558cb09753c5a
SHA5126ac253685b7bb4ea89f5a31bc288da52f780c839eb792647c4ef051eecbce2267bf4f818357cfa690d2552c4376a41eee48ddaa9819540412d35be9b766a6bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5464f87c9654de23b4e7dbb6d80dfc693
SHA1da4bbb20d77e98c63c412cda46bf41133c2c868b
SHA25613c9a44b3c7fa76a95eeac1a5af7f29b4de026f639f224bcbf95dd0abfa70632
SHA51271581a8fc833f03c211454684f222d8377404c20bd0382c2fd5b94718a8bc0cf6cebcf021e6ea2369431b04bcbf3d8e77fd2ab382958385127c8a4ff1d0f1969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e2cbef0f1832318bae18c2a76a6828
SHA1b0f3dede0ac4e6250497f48fb6c66188ae9cb43f
SHA256dc4e3083d4bb623a4bb0b4051cb354dd5e2093369aaf4a89260a81c0eddd9f75
SHA512c697c936a4f88fd986d31f36630dc87ae9c56290d4a9b2a7879cf4f3394f2f8ade275034455b94bf261a342111dbfed2c99e565809807066bd81f168ab4fbf31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e4b0bed7939be22461488ca82f5742a
SHA128b420bd20711622d89dd0622bac2d4fa463c579
SHA256dfada86f70b6e60a031b859363619da9b1e07549cf08254b4f4b3d595ec5a7e6
SHA5129850b049f005b48f9c39527c3ca17ed8132d942ba244b74a336dc3d473b079569357bc7ca140cf9b1eddc70d2f01fc11d745fcf21f1df43dab42c1fce6048415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7cc832e7c8fd4cbc562cca4bf37307c
SHA1f0730ffa982672b34776ace2af1964b12255d95a
SHA2569f39dd1565a98937e7a37f8e8de95ad67d1e789ddb9f40e26aa9107281e48c50
SHA5129351f90b9cbea77116aa3214c5f62810110d0c6444b633d6ad0fdbaf534c6056bd40b0d3ad42405b1ed023515fd5751a027b4e65643bb0f66eaec6d89fcac25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58689ddd90a958f6f0a38b7e585df44a5
SHA12ea6da41cf17835b30ee240f86dc46fbe676f53d
SHA256d8461a781f1f147b70ce3f5f057cda546bee36406432437ccc7b69cc901bf254
SHA5122980de54575bde3c0bacbb244c64a446f39890c6d24abba13b2e1537e4441da7be7b01cf27de78cc111996cf50d1d5969a89cdbeb72773efc9e20edfa9e3ccc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cef9564aff0455eaad82e2df81fcfc6
SHA13f5c113d70e2a68e38ff46216a6d1b2caf6e79d9
SHA2569a882c7b941883ca151f5175e616aeb2d7a9c284a08f1d3f7f149b1b7ceb5546
SHA512ac89fb55f8f542345aa3a4f6216ddb549aafc7153c1abcf3d1f2af38cd5c17114933406dfe2994c940055514c903fb70918ebef40817a7e37a2f3769251cc9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f64ed4aefec7a0c65553eb5d207efc2
SHA1aff77c633f486b8c718eae014b8b84712b0a8984
SHA256e581e76caca3d460d8e005068acf7a4057128ed3de65a28435ef43aaad52f800
SHA512ac584d03600f4257bda6b363fd7e4f01ae6bee87f59f267564046699134b711be577bc1ec45c09239db18ccb7ebe2c166b199259bea97ae16aaff49cfdea7bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1b8957446ee9c3386860ad119c9e3c8
SHA10c00e3afa65c3ac6cc86111ad93e52b35292bc96
SHA256ba67bc194255a343d1ed91b934d570721909abd3b936901edb5e78f89881ef61
SHA512948ddae0e444e839783ba408f3cb817076317c439015dba1b2c5667c3b9ee42ac23322e9259639ab9e5e785f4a395e982fd5878d388f190e724a19414dab58fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a00ebfd47df0fe939b8a3136ff5dac7
SHA1be3d4c66ae721628b5c3f848453407365a3c0702
SHA256389de550260ec065a2df0e58158be283c49250b0b711405557468e3347332f12
SHA5120d6c699b08de05df4ba4015bc032ca60badc15d7f527687b646a7d68e748e481e6c0534d55dd3a13b45dc5ad4109428147db641be381c1048a7e632c74454822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f3228201330d910058b62a25f468561
SHA19e6aed2f6ddfa7fa459151fca38b5b64bcc4e6b2
SHA256359e33f0e272119c14eafc22d64c0196fd2b5b93c77a71ddd4f3001fc2d627bb
SHA51245387461989a164f0c471b232cc006fe1d0b09346f81a79d7c54158ee2ea09ac1ca1067445cce16981ed2d93776c0e5dbaa46ebfc89ae87e36e32bd1a0faba86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512f3cff341ac3bce38207356c59a2972
SHA136ed9b22bbb36ce5ddc808c01a52e2b522a527f1
SHA256f8119fa049430d1764fae8401978451d017a925aef8509086f1b4e0176104527
SHA5124e13e3c00e0135e31c443df3567405be50ac29315b0195765362fa8f90f947c980207267be7a9fc61efc8ab5996754d3065cd893678d95cb8c5ac7d680c1769b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c85d16e0a94d8541b3d7c8dbb1a6f0a
SHA1a0a343ca69014d65a551c2b02469c5a5c47b1f0e
SHA256393fcd8a69b6180948fb79e6e1c46f16c434d39237308d8b5dfa94d2baf5fb4b
SHA51238e1a2dd114a0015f8b1cfb372ae3480efdd6387b708a76bd50a42b76d726fab77f36f78ecdb8890ed2db3d684dea9f1ac5ed0610e1ef498d00e1a63cb90f0f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a