Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
a2fd4fda0dcba4ad10a3ec5edd41d540_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a2fd4fda0dcba4ad10a3ec5edd41d540_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a2fd4fda0dcba4ad10a3ec5edd41d540_JaffaCakes118.html
-
Size
31KB
-
MD5
a2fd4fda0dcba4ad10a3ec5edd41d540
-
SHA1
30aaca4114e8115ca9239ad0deb2ce9afcb10557
-
SHA256
36ec45d3494e84cc7db86c17117dd6284becae0593c34716be01fc30edc5865f
-
SHA512
d48bb4d14d6b2be9b84eac05b5f249e624cac71d21c3e29fa726caa788118b0cd176edf700d375f98ec78aa6ca4a02e7ccd2f9af505bb78a38b3b315fb352bad
-
SSDEEP
768:0PUDedPCt021hgJGqLNk4wydkobn2fInYdjZApi:0PUqdPCt08g3mgkobn2woZApi
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDBA39E1-2915-11EF-90EB-D671A15513D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a531b822bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000dabd91190fd1cced6b8be44a0a6897c345b69efe10988a2bd77fd08cd502012a000000000e800000000200002000000079755a6a3b45de67c610c5819020b8c2cd763cf418f3bf82200e5025b54a54a320000000a1c48a17fea3f9881759aac4eb05c000b94f0247f853a79cbbb2ecfc51371a8940000000deb44327803879cf4b86a7b4ab53804aa7597288bf8ff9099006b42b8a70b399da8e407789c2f786f4efdbd4cafc4da236bcbc3768288cf664b46a4b1d5f523a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424397804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2256 2332 iexplore.exe 28 PID 2332 wrote to memory of 2256 2332 iexplore.exe 28 PID 2332 wrote to memory of 2256 2332 iexplore.exe 28 PID 2332 wrote to memory of 2256 2332 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2fd4fda0dcba4ad10a3ec5edd41d540_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46b8d59197cce4ec4680bc0f9538a01
SHA1b8ad98431d0b7d96977722fa6a8f0fbe18098660
SHA2560af1f6c5394fe8b87ff16d93ec9dd44d34c4d04c923063e376516da46ea358c3
SHA512d19d4ddd2e0794c7be59b1672fea2a90ba761d065a0848038bf070335515afdec534af4af61310368ea9c6eddb2e7a89b43c4e648ac4eb61871659a5a1ed75f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf61dfba09f15bf352834b05a0cc593
SHA1297f6ef1117ad830615ac92b51d8140b081aac3b
SHA256c8133a065dc92ca145ed6d3170e0547775f3d86478f1d3c390e0cab824f9d4bb
SHA5123016af937db84a810d95106813c5a68607df9fa8ff568acf2642464b1302a4fa2cdd44fa02d7d4b3d0bd170f33dbf84dc230b89031ecd060d20b80fe7b02be2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ae76752b34b74ce98b21fa1110135e
SHA19c1af18bbfb28d758ec7d50ee2a4b248e98c83fd
SHA2560ad3c0ddf3da5caf0301523e35eb5861b92730543137d3abb50f51bcb9be0b0c
SHA51212969576d070e76262b695ad7dbfba91ebddb4c769c8948b366de8554caaace3cedd99f50ae5f59d0598e08aefb60f0f08e472b9a63333d2fbd07f116295382b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ddbbb973cc1eaedcea15c6031d88d28
SHA18952fb42df1ce6f6fd0c2e67137486afe15f4ad3
SHA256a77cd3c488842da24e99ce63ba726190a6148acc9e4f0240d5d44e8c4e07673b
SHA5128eb5962edc0b77823c541e7c2ed09dc1aa8c951d980748e58b51d027ad0f90bf281af42285b18655d9d776743c23005519c2f391702cf514bb6829c46a409730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5156a2375e2a65fcdb9e6ae20e6d34684
SHA1f2e6e82e80b9ea45b583f2f996990fd86c70415b
SHA2568edf0e8b93c39d0e1354b46aaa38e25b5ee0a7f95ee36f534703dcf45bdd1a06
SHA512583df963b676df2f368e51d89d9350143e429720aa2bb33c513aef0e79a937774e0114d75a58e77f175f6651fc502217d981bcc24bdb27de2570d4789a21d6fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57922be873bc664969fa7389ee6abe214
SHA11d0bd3b6c25a567bde470abbfa6639c0e1357dc4
SHA256c32d3cde6132262d625ba2a6eb89a8175d32b577bf1f5a44711f4270f8f53c15
SHA51277fe29f33a74d7339ce6e10c7dd7e9a899bd8db3e7ee15ad5f201e6fa877915a5f47640501d77c56a56f23c8dbbda901ab2a6f09a649e979818a0e082a0215c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1765820faad0d272d0a72441a2daba
SHA18b0964b3e089a44ccfeba27d4c4da5ce8711b21e
SHA256384a6afabdaf303fba31bf89de5b170ab7dc846bac599b8caea8ec5f47fe320b
SHA51279ee10af79aea696f790fd8073de9fef9f3f0c93e335a5a3ba801e89820161febcc71f69c9538afbcabab2c37019b49536bcc5145f5ba1e06f72fe967396220d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea5b2f2b6a72500822e658fefb65c4bb
SHA13d174e2370a76fc7b9dd02a491898b211b5cbdd0
SHA256ee293e506b2ded95c8aeb0ef867c73f8f8c488cc6acd7c6c3c9430ce1ecf3199
SHA51252cd7fe12e4931adaac7cecfa876a77855c07a92e17e6a0df0d1dd80ee258ce94b514f41d234c43dafc6073ea05f3f74090615108a7232ef71dc7f7129843a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d5259511319c6cff079a376c3849dad
SHA13d100490c9440cb5fd5b48138039547b039c72bd
SHA256d6864d54f0bebf063a5ffb8a55cd58b9544034c1fabcddda00821d00dcf09f63
SHA512a957a73e080af85955809a61e7668944be70127a58b885a322473ef171ec92b16d7fd957c3b4ed3629cb7a69809992f9f0f91387dd7dcdffa4adac656cc546dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e0949c708e330e7f94778632ad671b
SHA1e86a5a7573fa62b2711aa7c7759f31547deda71f
SHA2564c50a7d6a9fb244b73bf34bee7dad67ad8ae8cdf1fdc0d9f1ebbcf65b7b33180
SHA512f3ba2163832045f71e295c4880d526779e07d8443c82d48dd062c1c9c5a74d24502a88b1633ea24152a0ac7d38031a17aa593ea37626d873d3456b294f1c216a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58671c787cacea0287a5735cfb791f577
SHA122b4bb8b4edc688244121a49f5bc1fd7a2f3d706
SHA2565758a8aaaa22381c52bbe00adca07f985ebc5bfa7865e0c3e08a3650ef687a24
SHA512b55e08f9f712c14de45d35f46c023574d5154de63da71bc0fe4994e247c9abca2ae0f303c830cb48d0dd295387798d4cc2809754ab9c670bf0a335036b043403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e925773f5299dea5849b07fe20537e6a
SHA1b5e09fe385d179ad86eda31a3c343e49c1030a01
SHA256650695318ccd1c6e9ce9725c077c750f7d6560d4052616f962f7bcb423e5ad7e
SHA51238a5d5b58371749d0d739ca2c3228c04610efc52fe7f5c8fab170b601c4e49b067106e6ab77924d212c0553cb4259303510afba9e54bf3fe4734837048530b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8bc8d17366da80b069a95e347658a15
SHA1eacac1d4a87be358a245db87eb9a34f048f1c90b
SHA256f675e439200d350d9c30eb7dfd51c4ee7c895898cf65527e8504f473a5cbf273
SHA5124c8323df808c91b6e8a56858093ebfaf8f488a3ae5c37628120fcb1c94e0f061c1a8719b3be11eadb9b1f3f12183c25f468d5eab466e766fcbab2a0965164437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf087f8cbc3c5185bc1a79ef483ba0d
SHA1a2e236e9fcaa99b7c6884ae23046ecd37cc0c317
SHA25643230845e8d4a042e5c4b97830fa4c8689851b52fcdf4dfd1809f56ed6d67263
SHA512f80950ef8790c44c5c8e08927ecfba13c8e6359364b72032afc390ae3bf2f94ba7c160a76d8152d92cbbf438631849869a6ed4e34527a5ac79b31476c640cf14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5619268d5dae6b99059879cb5db6c754a
SHA1c4209fdb19ae21d6bf2bf799dfa9f6fddc736361
SHA2566e4f316f5280172ab3ed1b2aeffdd4b542307f2c3788098751c2f732a36213fa
SHA51252f5ea620d561bd45cdbab40d83f4c4d93907714adc7eba0779253081326b450d50d25f3b60a3827faacd8580e328c9097cafac076c8c312354b857976dc87ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52204574e747998625029b8107e2bc50d
SHA138832a99aab129512abaa5ba959858c161ac8fba
SHA256a31983114f23a5bb302d6c2fcad36ef2374a14e64558269f9d2f0f526a81ba57
SHA512fe4c1d34bcd4da27b24530dc35a25aca1da5973ea515c68ba94d0ae097df0a7cfa0292ce777871257f28d80fbee07f1b3e9a0d6625785bc54bf32d876acd1f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0442d73ba4818fe27f6b6abac455973
SHA1bdb82d9e89873399412419adf47b63f28c3abae3
SHA2561ec6860d27fbeb9ab52f1074d731b6349108b19894d2003d6d40fe25446731fd
SHA51246b34196ebab8e2eb6c99873730a4cf67173eac158b7661a0ef5f66216c0d0db05b6c97176b29c63fafa99f37ff01fa3344acaf8a00c46fdc30a3abb2a458ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7f3f59d38cdcae2d8162c6ab080cfc
SHA1cff4e45a09f5e38d1322c74ebaf4802b7a9bb7fe
SHA2566de199a4bf6a9e2767d90458862c198e7c61af843065ba42628d00714e236904
SHA512aa9c207cdb63b7a9414c2b22104397da050e4c2e4df54d91e21b9c0cd1a77ef3e5987d6dafffad1960bce11993644c7bc2243f5010cd941f20375ed2ffdf82ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db760e9b89091668096b1a9028433b7
SHA100c4eebeb6e210da0602c8996681221cd7f06a98
SHA2563407a70ac45aa979abaef14bc8bd1c77cdedf4771b3e175f6135af264fc5a0d5
SHA512b5c4886f291e8a9e7def7e2c43f232d8b708363001bdfa2ee890573573b0aaff3c4ab21f31e3cc8a285a1f91887817c8fb491dbf8c986012380e4f1e3d477413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d5cd890b24a8fc4e2512dd5a58b473
SHA1404362a2ed74dab6c9a09aac8260e2d4562d0498
SHA25697b0bfef3d20baa6267fbb2b00b7bbc6ade80a52c75152319b30d47ecfa9b89f
SHA512888d144569614a1dd94a9a8362f56402d157367984eb42b15b5d37f023509d13392af309c8076cf8e4b98ecf0c6fa7eb1f936d3b1eaea6f6a89e2374a2fb8df2
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b