Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
2f8925673b3bf2801284b0eb61e82e4e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f8925673b3bf2801284b0eb61e82e4e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2f8925673b3bf2801284b0eb61e82e4e_JaffaCakes118.html
-
Size
33KB
-
MD5
2f8925673b3bf2801284b0eb61e82e4e
-
SHA1
aa934b99d9cdf080b0a740db3c3103cd3e035bd2
-
SHA256
e82439111071ace7660ed47b3efc5eb95d01c4ae687a48264b385e9acb1e02d1
-
SHA512
f76e72fc55157a34be42f6fa84b2bc96745bf2d096aa58b99f31646c4113b9df28c61e7617d7184e83adf54852939814d2f3e0f6f96a1f44e54d7426dffcea45
-
SSDEEP
192:R2OoS5Pvb5nEnQjLntQ//nQieDnSnQOkrntRqnQTbninQUhs4wVIwVzwVQ4RjwVu:oOoM1Q/YWo4Rz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421512599" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000098c179242a371f279aeda6caff630031131ac4238268c16ace10e8a54bca7b77000000000e8000000002000020000000b279ff62d8dbd27f7539b39835f5fd16f068ed6860eb8cadbb1c36c76b985cc12000000048731e433db942727323aea26c6f1c9f53b2a7d05b5e84e9a401b0755d1ee851400000006acb372137aae3203ff3f5f22509829c61f76e75cb5ee1c9fdfbd0f288c520e61924165c45aa278e851cbe2ab15e902f5c7196ef4180207e1b3117aba7ed54c6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f053ae0de5a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38F882B1-0ED8-11EF-92F7-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2372 2864 iexplore.exe 28 PID 2864 wrote to memory of 2372 2864 iexplore.exe 28 PID 2864 wrote to memory of 2372 2864 iexplore.exe 28 PID 2864 wrote to memory of 2372 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f8925673b3bf2801284b0eb61e82e4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c92f981465db9e9ceb2ae2ba623b56c3
SHA1b92106962dd6b2ae04f6770ee0f694768ac95ba6
SHA256d5190827190ac9c5f0cf9c20f5c7765cd21c51f8e4763a9bc287fe28ddb7d8ca
SHA51230e9e56bf723691366f3297304db19854755350f9bccb9d1b458853aee6f219b1f02bced2dad632ec2f827d048f9834867b016aa817651ba0961e64c47bde26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578ac669a3e91d066df0e4c78417a5d02
SHA19cd73b0e71d2d874472581debf5ea0e0259f7b48
SHA256f31a56f89b92deb79f6e52d41c73be2b263a88dc866be46fc1a15b209c25b002
SHA512166b6e5b5d343f73d3b33a629190be052ec37a890908d607da9432137fe74fb8309cceb6d327874048785f2b0fe6dc6f1b473406249e4cc8e9ee450964a9cf8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52454ff846b54cdc8867414ea968a8949
SHA106ffef13c49e5a533a5316b8de1275736110ee26
SHA2560614b674c44b2e98686327c917f1aa633b926b3289082977c63306e43f618584
SHA512b301e774dc8a45f48abdf82ffe68bc5292b83a3c2e2d59374022455e2502d8143d91a35d482959d406ed8069fc4a046ca298bfd3c9f83d41322e8d1a8f9fc49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53079b138d945284c7b2b39c5bf7b4b49
SHA1e72b45f701649034d403c728e21bad71c8d3483c
SHA256258552a1f96bbf81effe095ed6e0cfb66c7b7c4516dd5f79b5923947fcea867a
SHA5128675364781baf7d7de786102e279e013d1e8ad009f52b0fcc26048befeb8d09635c3c4d7daee395e7a475cd6c050a7cf3eb1f4dae7b828eccd24bdf29f033fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dba6bdb742e83ecebe2d2126f5a4414d
SHA16bdb18ab9274b0a364011e17318c99816e6ee9d2
SHA2560563b266a67aff390b8c0e9c74e0861b030e5ad6a689609b840ad138bf50a9c5
SHA51290850c80fadf7478c026bf58e888e60d289aaa375e16b23af06da81de00effdf23e46eac46d0fcee99a2751155895aeee617d1cab4d7da51943f80c069c8d162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f4bf8018d1bde3893d82c67e53f07e
SHA19c24a22d82b3433d9190d09f06d7f84b7902290e
SHA2568f9de2e0fe05ba1d70dd45b5f4521b7308ecced50039c1b5d7826b15a90015bc
SHA5129d319d86b02dce74f9b644c02329f6823efe0f508e33df28adf3f5072ec7b4e5e88e3060a7712f79c125b88f3762f8b0561ab15bd6a1b097ec246176f2d97478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c954b6fea48fb31211f9f5a40ae9ac
SHA12b839b61383d054c5ab4b24f5d13a444479d0903
SHA256189d18418f740d1a731b671ee580da79c5ece62bcf0fc8ac512ea162199e92fc
SHA512404455c7d13f042ac9f8b57a918169390879df26549be354a46cf34927b84079aa493c7ba9dcdc1b5e2fae253aa522957ea0fdb30edaa072366ec4e4f371a76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1fa895045643cf1502c68849a0f0a6c
SHA1b907031dd38b35eca0c2628e0ed34b9375a046a2
SHA2567904a4ad6a9d33f50f5514983fdf2d386822376088fb2a2ad51f3fa0d0a9a516
SHA512b863333bf8286b5d464a596704b4cdcba7e44c517069df6651d1bd45bfb0b60c700d99a702712a3249569f65a9bdd7a802b2d6b50834f68f047882cde88dca49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7cd0a3f810400dcde79913c01f9c74b
SHA13172f03789ea7e4dd1621291f94fa18ca228caaa
SHA2560a31230dd9dd8976ffbe7f613ea8b24c87230b19a87cceb81bb2758cc8d67f4b
SHA512fdc18448a51f8db13c3cb57dc7c19b56bd3a69788d1c049b0d6ea8199cbea4cf6dea9714b35ad363fa1b83cf618c58ed475d575e100fb260582af09ef8886dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d8662c03ed6370f272c4ca891dcc911
SHA14f91fe8ae580ebb5992a32c031865fd7d4a3d817
SHA256772de1ecfa547813f477f5105aa17e408b7ab8494aa88cbe4ef765d1f245f452
SHA512f4327058da3e2e50f02fb5f64f904c411dc5e200c65370c43865a24c509e6a6847fdb3f85513e858327fdd664afaf8987ef4e0a53b293088971526640cfc8f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56319d4e3907b87536373905bb431297f
SHA1e95adcfad5d928d08ee4afd38ac6160b988526ed
SHA256a43136d0988c6b303070247e7e12338a9896d2946c1cd6aaaa11ac105f344216
SHA5120b6f6b079bbb93094363f9b666bed7e8c33966c3d8833e9c0747f0fff4d61f5469bac0ee7578a7a83fe89878b0f1d1a27f4d4fefe64407a2fd03a98f195cd390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e04f40687e30e905f1c26c3f7725edac
SHA1520143ae341ace6741e8a34d64e9d6661787c4e5
SHA25645fadd23e1febd9f06a0298acbe36a185157c639721a44715180ebadf987e20d
SHA512a86577b556d7c04805bef1b9a6a9a073c1585fb563883240a8d29d32423f9b8be6fbcf0a04826bcd70cd349960ca251d01927d16ce0513cd18d2d9d31fb6ce68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54833e953503c6c77d9387b0f43b5a22d
SHA1e2e949240663b5254dab7fb8b78e76b0f9cc4c19
SHA25663409704adae923c6876978fa7d8d2f261dfa4fa751e21a3464c51ca8384d3ba
SHA512a122fcde4c6ef4205253b83c4aa104b7e35163be696ecbabd5a728b49e44ba7b693a2083a03b9855136c13e1682262a3a71cfe5c9ffd9f3bdc46473ea3826a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53212bc772120ac000e29ea343890b276
SHA149f61c555a88f344cb5e03be2b23a1920010bb57
SHA256405bc41358e77206e9d676204bfb323a5e008ac2c811ccfa72b2474793fd8243
SHA512f1ec0cd49c84fedd0921cf16f73b6ce99d31654df29b0a3a47efce3e10d19d14e43c4cabe37e700034e4f7166593a2a092ecfd2ab0671fb9bf31e6c7a0e51721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59da0a7f8bce2de975cf558206291e544
SHA1982d172a900e69c14d34b8525a819f47ce20b024
SHA256f28899c65baa98ab497205ddc21204501d68ec4990c96a6651e45520ecf5191b
SHA512d6acfbeacac9a3b5d7f8fe9e6c68fc39d3bd0345e81b01acee96085818fb90e0175dc244657c8049024cbed4ae7900373e7fb54c5bcb00681d75a0ccf40fce6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c22148ad305f44c232fca66fe0818f1
SHA14d23c6e02a63030fa54e232861a931fd385280a8
SHA256f3a39e7b284156675d4627716fc2d1739cfa49c1828c1d0aeec9bbd602a2a3b4
SHA512cb958dfb252bb346427d8d99a3dac1917c92500a78341bf223833eee8c0340793fd37654d2f42897cecbd326cf93e672ecb616c780eadf72995e3ae2346a79fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebb4c95810669680dee01dccf21b9173
SHA1cb9e812e955022bbe0504c74fb548912fb89bde3
SHA2562d621e54df34cdb14b9c47083d58b8731d5b51b59dd5822a2a9c5e19017e7cfe
SHA51251529771979e5ed69471820f26fe877f68a2aa403c0ca48d1f46c3f31a03169fa4456fc1e4809ecd69b5adb447e46fb82f5768e086b929599c4cd14c40a0562c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5498ebb9f387b4e8ffe03b6af55095460
SHA16cc8d963e1e6efa4f649461e63990c2a65794ce3
SHA2564c4426458cc9f5d02238acce819bab5df279bbfadb5ccce4f684b3f02ccc1102
SHA512d2d15dc6ea1ef38084b7b4afaafb7d7b835019cfab5cfc2d82df2cf53de92bc5d91873daee96209e3b4e4dd40c629593b3d9357de7c81d9af0598b17ab49934f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd80721cab419929a85acc4af4eeb6af
SHA117c1104e37a325f8a0ec7f0a19860d5cb9ba8bc2
SHA256621456ee69baf7c7dab6260fc98d5792c0b4fcbb6775984358ab0a1102159fb4
SHA512e3cbd133bd4c03f60e7edccfbf94881e94ba04640d171e29517f7caf9758a0f1f5e38ecae5865ba978d17bf29e02e5f2bdee61ee697a0e18924a751539038ccd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a