Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
a2bb2b5c6963eb7eff10eac844d6ba1c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2bb2b5c6963eb7eff10eac844d6ba1c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a2bb2b5c6963eb7eff10eac844d6ba1c_JaffaCakes118.html
-
Size
25KB
-
MD5
a2bb2b5c6963eb7eff10eac844d6ba1c
-
SHA1
65ea454c1909b6a95a9b413a8552f03e9b30761c
-
SHA256
cc35cb665eb8e3b2055e5676b1c4935a8bd44d214f2f1adcac47022edec962b6
-
SHA512
af6128118d2d234b99e7c3addca4e3f4b24444061b914c104ed773147b812f19f0db525185eb909e8bffacc7f7f40e5528f3a573936e6d098f731ee6f8abf61d
-
SSDEEP
192:9jLryUEnbEFfNe/ebN/mNfNemkMrNOnOZTZNeNeIzNhwl+N9pNeNb0rN1CiGN0AD:9fREnPkvOZTmw6zJJpnPO4dCtQO8g
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e77c389b80082d45b1ab61ed8abbd52d000000000200000000001066000000010000200000007e9624cb9bb9d320fa66dbd38e256b035950a5aadaaa907f17182e334bf0bcb4000000000e80000000020000200000006cfe0bb5e99b46a8ef581de2cd7c52b9894a3455fdb611bd63968ff823e870bf20000000fceb4d111a0b6222e4c70d8e028829e412e18a5194f60604fd13bdc4c7c9262b40000000bc9d70c247bd4b7d8deb2723c37d198564e0a687b172360ae75eb605f944c1db10dca671a206eea8d65876b2df352ba4097ed4368472a26ad10c1a188417ba7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41E4D1A1-290C-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04b892f19bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424393677" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 3024 2728 iexplore.exe 28 PID 2728 wrote to memory of 3024 2728 iexplore.exe 28 PID 2728 wrote to memory of 3024 2728 iexplore.exe 28 PID 2728 wrote to memory of 3024 2728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2bb2b5c6963eb7eff10eac844d6ba1c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d671a2598f3a45d0c889c4aeb067c9e
SHA1c6948bd6d6c0078b14496752374a1610c95301db
SHA256df4c8e63ea2880ca00dbc03fbb9bbc6f3de626de63a856729900e0ccc05a2ffe
SHA512123ee7659791d1b18e36ec1c36c6cb39e9a69808b3f257260bc6a2309c85e15a1953688c58e37d1addf6c53623a01ca46462eeb5c0dd4a8ec913cdedc29be0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5184f7868ae7c184ec8067983449bf78f
SHA12bfb3f1647916937bb45e29555a6e8efdc538499
SHA2568adca590db738718bef1cb4e93cfb78733eec95f57978717ebfefb1a010dd835
SHA5125b0d06178ad4126ea66b4afb060894a958fcae7621422765117d175c260814f51a375eb73e609ed488f42f79ef7465e5525e7557ea060d4843a09b2e049f7b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544d63e5d8b897a96e0774fb072515d6d
SHA1933b8b65dc1a0e0c932d4930fdeca5b9cee3f751
SHA25684c15648da8050c02670ec291bf2f1ecf11e90addc05386959adc0bc7790bda6
SHA5128184e0a26b78d5f6ec417061f28550579a9d231554ed1ed10d488ed146d282a18cf3a9837b1a21f9e0b8d51b7ec1ff96759e16bbeff4042c4f1a3c598143f5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b912ba2c57536cd8d0efa1e94404187
SHA11a05fa5b9545efa5b8c1714086e02fd4871ff072
SHA256f84c871dd8dd6fec84d9c0675c17333624d9b62272b99bb4ab612d667083bf7b
SHA512692ac6bec3e8614bd41c82cba0cc97599500a9b084daf97c24df1959f6d46f0d4fedc029c34b01b24db761c6f40f2d15d68314b55488dd362e5a2293da98c89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5909bc36582156d03dc53c2c819fd3a0c
SHA1fd15b0e9510a7e1070559a89577bc87499f59580
SHA2568b86d7603daeed92894e5f14cff05fd615a6fa2e7dfa72f536c91051047f8133
SHA512993bbdb83b9341f57f666cbec780ed1367974d5e73a79dc62db289a9447c21f2946b6094309fe25127ec4f6ab75486a8a925fac9aba902ba30b3f39dd54116cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9054f75d51af302263ff017dc51e3a
SHA19d7f4aeb60cebab40856581746868d120e2310b3
SHA2564df2df1f26f9f064492b1f580f6caa7aab8b7a95167e9e322421bf5612fbcb81
SHA5129e0131d8888eaebe5f1227fc6a0d9bd9345559c4a5e30f12583c34a9170f0aa08721aa0095e4f7ac9d14c30fe391379a25bdfe7ae65f758e6467417013d31e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50000720bd0ae5794ca3171956bf7dac2
SHA1c61945407e61d9604e6ecbe54ad8104980c6b046
SHA25617972e05f8b8ab3debe27588c7902a9a76ca82f66a0ee7280222e79eb31f30e0
SHA51215df07c7dabcc30481189be74b0400b98c0a28907bbc6b7075b0e9b64e3b80c18614bed356f158bfa6f94991007680fb48baad0d0682fe478a3aa493fe251609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54289d71c8c4bd5df238580d2b02dc81d
SHA1874211fef0231411530c9d4e7788e4f41dd05a9d
SHA256d84d159bb0a1e9041b66ba84ebfe45fc0fbe8b2987622e8a92d9e0457593629f
SHA5127ff7657ad0f59a92086b2d0c00db93fd99f6c4ee0c00d376fbd67a0ed2f4fc16e7d6c34eba1c5c14fdbb733648cbbea7840bfb860ad41d7591653858b0212306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19cfc9ef46e7c370f8c1e345dc9245a
SHA1f6978c3b5f349bb235bd337d7191d239890a32bd
SHA25665607b651843226d959feb4680c9e4d887feb50dc52b1ec2740637fb46f9764b
SHA512b306722efed5466c9faa4a1f8c3672aa466fc30ef218f5111dc623f47a1cc6ff8f22dc565c29023ec134a750360d55bb8858f2b521646730fcc56d1caf99f4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63915ffc8871b39ed78f47ded7b633e
SHA106379542b03c7d5f6f21822dd2d4208d01ed3778
SHA2565a6798af4e6dad29de63b3a31968da31c377f56946f72baedff4959745ae775f
SHA512f059c84e5b5eef37bcadc6368ffd1a10389390ddb38cb78447897094ca8553bd102dc8b96daa9cbec3ef10a2f36c49c641a1a20c2b6b6a14c5308592eb35459c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d4c508c2405ae92dd0c7a36402b25e
SHA1bb6ab1b429925565c837d91241e04e5e5bdd25ce
SHA256bf96ee27cbd78ef5377848e1110383d4b4e80aaeec37568681393aee24ef8164
SHA512f1c7a5f2ef78ae3c66eeb7559314bc751f7fb95f9e8f2b7feba29e06d58f3c7108a5d65cf9de220c593fc9952629c5c5c7a286cf4d1391d0d1b43c66deea3367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523598809c7dcae542506fc6a2ddabc4e
SHA124b67973c11b2ef1b30ed471d15d5048f1d6c5d5
SHA25630a4778f27a2ac3897fa61a8345abf7de42dda7e20f1cc7efa599d5edbfae3dd
SHA51227ad46c8f02079f6e2e60484c6dbe9ba47e5f2a9ae468e0ddf1b2541b69b225c6c97e88e650477cc7e896e6edf632fcdefd81a56216801c25ff11ce2a9f75960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e1d22a0baa0c8c9c01bd430d206b3e
SHA11c668b22d19f35852fcab05ae058302d983f86e5
SHA256b74ffbe7ce97ab4b162aa54205b174713b05bb74297582a3eb7135fbb37decc9
SHA5123c64425e3c32c7efbeeaeeaba90fd66f435e68366f3f928cc2afc929102693548d43693e361f2c185996c7bd72f23fd7ecd81accdfb6a2465f09760c7bfbf3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52320988778334e8c6f587bd46b280536
SHA102154183bba71a9dc719f102a134397abdbdc7ec
SHA256f144c233150fe4ccd3ddf52518f8968c1454fff5c9fdb3108fe6bb9adf66e9be
SHA51222f0206540d7873a443d06b41f9c5fba1b47973dbc51c792a7172ee9c37c87e5406b1280e0609f3227bc0f04e1c42e2b1f1f9d104b87176e69e2cc3def80e73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3851444f3dc930bddb03da1c2dcc71f
SHA1ef679b1a5bbe2abcb29b8a76dff779a678ce2b4a
SHA25664ca69464188c3b00951fa196dddbf90a4607555f9f9b11f79b1a0c56e22e0b7
SHA51229db5d6db852d338a6d07c6f8cdc13d6f4ccd4a229b97b26595486dc4f4af4f686989e4eea5215648c3fe99dd157503c158aecfcc7fcf8dcf1f096e1ea461369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514052c246c261795378479211e94eabd
SHA11139985358e7c4dd7425bfee669510a31ded98f6
SHA2563402253cfde8608440850d0e50cabd0147dc57fc31dae04d31f93def2ebf9090
SHA512d69c0cf8c315e70875332972bcb6ae3e7111417deed329fc6ab5079c0d7f6cec24e4cf17d3b698f6c8d0b4ecd7eb0a99f3d7962f52a6e6c66241ce3dd317d71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be867371160284686158fbbf378f0e6
SHA1796f373ec22ad480022b17994da6473a57d348b4
SHA25681031e70396393ba279d10a50badaa925082c8a2614b8da20677927f6896bd41
SHA512ae89cdb5c409fd27db2300cdea8dbf37264856533d3f677af44d221219d5e830a8b5c08f6e76c78c05fc111a8240d3979cb538e391e9709ce2b6633e2376317f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1dd42afeaf0233c874893af7095a1c
SHA1fde70b56ab97f7fd972d61f7f9b2332ff232145d
SHA256303e0ecf382203fe91cccaba6cb69eefd139027788f8dac9433da3c1567bd633
SHA512f2100cfcaa46489ceff922440490480a69e0fa82f2fa06920519410e86a821ee0335380c0027bc3e4a00a8a4dee2ddfe1f3b3a18c32066d8a7f38e8a1e262566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525859fc635d62716a2a58215dc1b6569
SHA154d2211850eafaace6038cced3418affd5918355
SHA2562261c97e852ef4c76771546993f38a88c71c6c8165483b19e8fce9a151005b5c
SHA512c9cc410fa935b3ed56a3c51b24635b00a17b147c6d246c6a83b2243fabd9a966d96538b907477054a334c8cd8fe1299b90aed586f8b7455edc03fc302f7594d0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b