Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
2f5fc5d741602557a14e69977f5f369a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f5fc5d741602557a14e69977f5f369a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2f5fc5d741602557a14e69977f5f369a_JaffaCakes118.html
-
Size
69KB
-
MD5
2f5fc5d741602557a14e69977f5f369a
-
SHA1
2a98c4030c43e1a03f673def7787f99e304e7670
-
SHA256
e52fdec22e8684ab7837545a843bf92843a902d4e64d99e4adcec56db40683b3
-
SHA512
4dbc6b38287775d014c428534ddb58dee97a6da564ec04bcb566591ff3a22dbb85323e3026b380e922949f3cec5802f3b2c29a735a690e51e853b7d9b9f25fc4
-
SSDEEP
768:Ji+xgcMWR3sI2PDDnd0g6yBKiGZyL2hJYoTye1wCZkoTyMdtbBnfBgN8/lboiGht:J8nnwtbVTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000002592a33fe4681d3ae3e9c3aaebfbba6801aefc3249843edc91376f5154c52c9000000000e800000000200002000000041a1efefe74f19491f7958c07ae1eab8a8a8e71591faa4e2dc837e3358dbee8f20000000ddcf68fd262ba7f113afe03aad9381e85f13cec6ed21e42bb23b23004bb774ad400000005964c540d2be204e3eef407ed4acd5c56b32b956d5966a99c43d70d2199e4eb40dd4e61abbc4229cced242345c6acc5c25e68a782b359a156af28207331226d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60DF88B1-0ED2-11EF-9034-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421510087" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50577e35dfa2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1788 2032 iexplore.exe 28 PID 2032 wrote to memory of 1788 2032 iexplore.exe 28 PID 2032 wrote to memory of 1788 2032 iexplore.exe 28 PID 2032 wrote to memory of 1788 2032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f5fc5d741602557a14e69977f5f369a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b22c62316daf513ab74aa37d42a62e7
SHA1e3a766c902d5a4d92b59de0d9c870526c55fa06c
SHA25667817536c5432e91240e14839f0153f0c6203be249dd2377c34548afd368ee27
SHA512e6e01c674bb4e10886df970f018713b1031088142216b558ede7c3527c64e597213a21827d7162f2f3d775a6dd8ffea4a0a7e985712a57727c82c26379386507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c1603d968eca70478f7ecd9ef271ac0
SHA1814dd793cac2013a31c01c91a0847997960e22f5
SHA256096b9a5e1020cebd28b89fff143a51b80941b1095f6edd67c5fbdf0412004e94
SHA512c52a0a923055db2efc94ac4d3aebdfededa01332ae2115caafda7862cf6ccf6f78fd26e2a2370816dc084eff31ce6fd208be74b6a3fee9dbe61cedcfe782d585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c4544029e96ddfdc704d16f58085fa3
SHA1f1393a1d031ae46c0fa0bdc0711bf490f2013bc5
SHA256aade12bfcc2b5d02735250693871a3b4f246dd9e7f84dae4e7be506f2f36b644
SHA5124d0babb1643b615221b6b86944f42f051558c32024c60b6855ec8d281835573cd918bbc9d3f669076fd13f05628b6feb565e21ddaa060d8df144c28053bbbe2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f94ad960e1ca87d04fb0b26c1de8c56
SHA1122b30d9500ce84975f67c5e5f6abf5279d3295f
SHA256767b531880570b5c1eff8368ba68fb4130d74ee4301a10681fc36dc8be1a7405
SHA512cef10e34dce4e9b1a559f8ae62f1881b8417b3d53a87bb08466ea9665c86c1fe49998ab74687e9943fcb0e8021d4b8fd2523518893017d0e3bdab9f13aabd55e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8419b15e96c77a984ad0017196127ee
SHA11146ced71f954665d2a1a9b50a4250335dcef9f8
SHA256002c5bb91490bf2e1af7201ef09061ebc0239360eb10401c0b71b79670557d4b
SHA512b8b791be39235cef1dda69ef0e02716305e6bece84920eecbc7ad1764b277008d784a0813a3026863f2aeb30761392aa5c28935b3a64c134994c7bb1c03e9aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d695e5ca964dd33aaebaed56cdf89d2c
SHA1efb3518089018e569be9e4fa5bf7664d42ef86ff
SHA256b8864b2238fe1ba2a82acb7e13b6fcd221124fcbd13a8f74dbd9b365499cab1c
SHA5123c12a70da5f46ff78c0aaca31f9e9b5f3b8728fa5319c9f0aa559442f84f543d8e67983ea8dfe5d3ca383a3dfec07b08d1ba6d0d87c686bfc7aa5e029a358b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddf61540615bee1f7fc0811bb981ae42
SHA1f7fb11f835eb6c1b6fd0d2921b36c3c3813f4610
SHA256434724c2d32cc83f6f819e23f2436de6a0843715bf86ffc2746a7ff0e21f35c6
SHA5120bf66a5e56bbf6c680115067bf4c482ab85d7004ca8b9e142fb85e4bf1fa58e13f0d23d2fcc1e6bccbf69b922ef26a0e124b4c9db62464cb3c5177c1277278ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500dd3ac69fe7387ddb4c0201dc3d48e9
SHA1ef796865ac6a601e0abbfb64165ef2a6f0c6c6fa
SHA2567df36d0308d0fa974fb6b0075deadb738d9f141078726a2d0477b036b40b5dc3
SHA512265dd2a47dbe13b1035334f0c5520584bb9d4117b141dffa6171ba64a22338d6f3a22be4ea766324a5c117bfabaec20800be2bbee810a731cd1be6e86aab11de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dafdcbcf39d9c82dc7bd19db9771d33
SHA16249a985ba877789c97ddcda8378eef708ef276e
SHA25640e7d26694f29a90a23d5f071d47e7e2b054d12318f60fa93aa3c62d0fe95d76
SHA5126461474eaf6c1c3e306fd4ab4fda283b387eb75a138b938a50baaac5c25cc9920ff8686d555099b97b44354d230f3a7b56ce6727e9676fe982d43337aaca40c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59126af64bd0204d8e7f694258ece69e0
SHA1323c95d5b64dc1514726cd7638456811791a214f
SHA2567e9c5de7fbc8156c5f45411858c1d68818e080dd409d69d5e3cd11e19078abeb
SHA512bac185070752309b201f1d4f787e83eec6c80f86e580ee2e82ac6c9379786acc7e8e21d0abe81a78809718266083e0c3e60015bdbbd37a87c0cd029e56efbe6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd519a13cada560bb359cf09001b6e76
SHA17f1c2f22e46f97b8b5af2c3b99324935b51d122a
SHA256af27f0779bb9c94bcef95061b289924501b36f122ad5160b7c36c1c22a457dc7
SHA512d874d26ffbd7644eec68abeade67617bf96d1ce271018b223b189e4ccfc4d3bba4be502bd84996ac25f73fc9c0ead58155c8c02b3a3100b471df249999357e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51861118a67e3934470420fb3a212a42e
SHA168e89aa0c4918d79bb83775f92d1096deeee2d16
SHA256e45614135a7f8aab5695fe16adda4af534cc26b6c7506a1d4283f1fc1c01c277
SHA512f6010e3e79160fc264e6c56f164339cbe2c674f3c47e99ba4ec20d394d50d69ce6f142a2397415fd2aedbb6aac5cb91fe93cedcf0eb62eb52b9082a40a1aac4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6139a3ee9982ec32058934fc47a129f
SHA1d6c9b0b9c04ee187eaeed0a3cb29efa7abd39fb0
SHA256fa288049d315a2d349b78cc0a78208c764b8add258c95da732c2689447e093d5
SHA51216704fbaa0993821c076410d3e6e13e4f8644cb01b5421a56d510dbcc6cbaea134d8a81ac9615bf18db39515bcc3a976700429275da1d6b11317f19fb159071d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a02b99492a55434b4edfde196060182
SHA139123773095d32cdde0387e47f9a9acaf24d1015
SHA256848c446ef3fd5095bd39319bbfa46fca39d2e4bf0fdb6bd62f181ee5cd079fc1
SHA512d05fde93d4dabb42eab25a532fa86f95eee87a4385e379f8f23e466ce938fa8355823323600bd41165cf6cd1a167860ba637bae0ef442579d7c611798b3b9679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97d1370f9f642684e45c17d80e432a1
SHA136eb265035ad3440681b73bed444e85055f8e57b
SHA2563b529000b2eb561119e5d7198013c0ee4ad766bdb818827377235c68927b3193
SHA512575afd7e595fdb9582d31e4472debb81c82672969d55404e87ccddfbe27953232bf7ead4f1b28612dafa71c1aec2a22a0cb5b673c131b35a89264f7d5cf8b85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e645dae26e0bb503d082171fedc10be4
SHA1f0d109ca76637f2150f882f254191cff0d661d44
SHA256122a6c7c0565ed400792d2e976708d9c159471757006548005df00c703e63607
SHA512b382b4189767262ec22628d444281717a488eb7334218ce9bea06495bf7ea31b0152c84c5848d8080f36b8b250f36ee69d443c18e8e8309165db6cfc0e942e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50498b0ba224708bbdb3d09bd87aecb35
SHA15055e1497d9bebea7353f58eeae3e56fbd0f69e4
SHA256fdd6c4837a6c53294860fae0bc3d814bcad9a7f5cbee1bfd0a9c0276d77df5dd
SHA512472b383612767abcddd73056988729464e62d56d4cb8dc6362b3d393bd46321ce347f97f535670bf990cb46853059e85400f282e96ff933d3501495504e852fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb487b18bdde44851f0a27b079d3faee
SHA17295cbe288fbb88804ceb24783dd352636bc3172
SHA256a9af9510df2a396424196b83463599bd7a28a8c2fe2a58017e2fe3c86c29ce58
SHA51229c22a3d5d070c0a9f3e4c3725db5d3b1c72256982f4f4a33edb2d08485ffbbed4333834696e075432b80d026116ace59ffff6df331ad0eb7872eedf148cb230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b14c3295cca7d02821211245f9745c00
SHA1dd826176c1ed4f2b07a09b52c76bd94d407b6071
SHA25611b56c1eeaaeb199e8fb54bae4c3974a45218711f15001349416eb71501dbf71
SHA51261b136722a3ec8447ba7dc84a7ec43d504bcfd7388220177cee0857ec34fa159e9b22b24facc7a23add4d1abe8d61a7ba2fa77de90205f0b584a5e95a7936cb9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a