Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
a2fcfa6ca53ff242372bb5aca4bd030a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2fcfa6ca53ff242372bb5aca4bd030a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a2fcfa6ca53ff242372bb5aca4bd030a_JaffaCakes118.html
-
Size
460KB
-
MD5
a2fcfa6ca53ff242372bb5aca4bd030a
-
SHA1
d770f2c67776999a09649da6fbdb75dafe7b35e4
-
SHA256
e70313f60cac9a95ad209adf60b09e63c0724e92cfe246ac28600ae95b8a5b44
-
SHA512
5f97f02b10786368f162fa4893ab8fe92cdf4b82feeea377b51be1fc35d1cc11046ab3a5ab3c8d91b8236bf037afd6b70579e88fcfd4cdf023c83b224b5c1b41
-
SSDEEP
6144:SBsMYod+X3oI+YdsMYod+X3oI+YesMYod+X3oI+YLsMYod+X3oI+YQ:C5d+X3P5d+X3e5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424397748" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e041ec9422bdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC614CC1-2915-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082db810be0e12c4bb7ba3829a47066aa00000000020000000000106600000001000020000000c9b61a07cef9b2b435c13b4dbdadbf965d104a1d78aaebcf4da8268c447a07b8000000000e8000000002000020000000ebc67317c204d1ef6298b9d23baa6975d60ddbda847d32e9eeb9c8baa4a55e282000000056edadb7f123d9e2440132f81820c4139ab140ea1e0daf51454ec3b1b9a9748740000000f5a951d1ca2425c465bfe737b5a6d52ea1c426a941a81a4b04e71446a98a3231102c5b64b6735113e53da4a7c9046b01af2e1c5b36a98a5301b051b44057d501 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2868 1904 iexplore.exe 28 PID 1904 wrote to memory of 2868 1904 iexplore.exe 28 PID 1904 wrote to memory of 2868 1904 iexplore.exe 28 PID 1904 wrote to memory of 2868 1904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2fcfa6ca53ff242372bb5aca4bd030a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db2605d91284f1fc2a7084124efd17c
SHA16ef72a13425fc0ea4af7709efcc185a6f67021af
SHA25665aed544cc50c57de9364572da392e63b80f9bedab15d92588d8112c68100d07
SHA51282f3c3f6188191d14049a5f9b35e731fc00bdd5803f3241049df2b2da8257261f1d273abf7c474d5850e23800e474ba25b1ed062f69f2718ccf5d0a7f324748a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f795355c6f4fc5a47e8410c781d332
SHA12cac2ed966d9a67f14c04cfff58d9c560de1ad90
SHA2563e2c4b471b8f55fa661d798b3930ea8b40e8e0dc78a1786a45ad17852d3522e1
SHA512148e3890a344529d6b1d24eb56de67790a6469ec11bdeff8e44b0fb6e98478f300a0c2c7c00c45b1b449c5674a8fd1c811ade9facd9ef2ba62a64f307679fbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b4187bc152a6ff52b2f1b7d55a3f77
SHA1256d3d18bd67ccd5124694854b08574b28a369de
SHA256e7c4413c4bd2bc05ac3817b1391def9ce506246ab80c28a749a922bc7827a151
SHA512352ce54939c481d1ff2e6b02b3c62b3f60bf301fb9bc1faba16cd8404cd87ad178cea7626af9fb898e56b30101148e53765475f125d9bb93a2f523cfcb41e67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d38d8af8956dc2e72bec955932b18b2
SHA100020f6435fc2c537d1fdc46f27696f2ad7ec808
SHA2564ed661501be29b9900764166cd10bffd0c78be278c7b0cb43dd0b8c1542e47eb
SHA512fccfaef7c97bddf52a5675650a667cb77c70689046f68807ba0b97e9eb6932d11e477d8060e8511920a0440a5345bd544fc51512c9180a90a7e1de7065a773d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5858c528558d3f3d66f1e1d8f884faa62
SHA15d27cc46e1787b05bdb17088efab08011f6e6118
SHA2569b3afd7c91bb1406b5bfbd4420275fbf977afee352e43c9b8718c56d18c45eac
SHA51230ecc227213504a6ec7269f49cb15a7f3b7e4c408b61aaf02da158fb7c51a0580f93c2d44fdbba16b849735691a9ff0dd721e82701317232050d94f3123fc7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516063eef858c448c7d0b2a7544023fe3
SHA15e7c7f4a9dc6b20731dfdcbedbf3f3d6b90950fb
SHA2563bd48a74a7f24c83c18b92186d552e148e7ef4306fe6bd2607b4be3ba2d1c769
SHA5125a7b47035500c55a093dd45edd34880ecd3671491ce4649a2e1715521576558828fd1455f6aa6be6af0fd423046100b72a26c824bedc7b8760929d185e90d26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f748c69fc727b0c974fe9a5c14c5ce
SHA172339a4227a00eb7cddc7901bd2ce065af48002c
SHA256e122e45fe93f576ba0bbb7f24da41f4f1cdad2ca4adad3c22f09a0dc71304880
SHA512b7f11dc787a10f525dc0f2dd0e0ad80ad7bc05d75e1e5a496e1919621bf6e43723b0177f800d0308e6031e5518e2d6cbb6cce9ffe5279f59032d26535edccbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758d752058a5d2bb5822de346efe0550
SHA1d7036f636232344acb9ee1182e0b4923f3ec4acc
SHA2563027867d95f2e2084c2dbc74d1faebd86ff9584c4019b6da16f984abf34e9924
SHA512fbb7e85479885d58198b0259f0915930edd661336e12ed8f654da735cf659ad61403cc083dc9563ef36eef6b3f6aaec4f87df99e947d5d7763f88ec344c59e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf103c70619e4dcc1be83c8ae148cb3
SHA1162e87b00fd7e7947642760efbc928def39c790e
SHA256e069a961e786d2a06de5577b2828c80958137881815791ee6c4a77980e2b4147
SHA5123dd5380a85c80d99f8d2ee5af26d4ad3c09d487f35915ddad5b2d4733bbbc125ae81bc0ab93597a157b8bd9891ca8bf1b1904add1dc7c42b486e73cf8711cb61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96fe221021bfb2cc81288345b874ef6
SHA1f05887301026d0c6cf4694c73cd64af1b85e6e32
SHA2569e8a09cf9f511dccbba37c0d45c44d8c23cf680e498141ce40e629f55c873cd4
SHA5126089fbad54400a52a6185d22aca56cd428ff086a08d380e47d8fce21b0b1069cdcb7521d52118811f66bc2fcb9669bd14d477d4a4fc2a3284f75258ac5d4b746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a19fce73bf2d28e8b7445c177e6b1d
SHA16037657e4fad3959d331714a9fc36ae740b00a3e
SHA256424012d0aad934f75eb452362d74558da4b517fe554a61ce8c8fa68b4e529b04
SHA512557ca8c9643fa0797dc909f6f20ae1f96d7d32eca2a5453f40e9a705834194389c502e7a1e06ec8a6ae841abd52ca55aee5ea237f74d3b7d81b1639817a675a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8237b26bb31ae37776381d61e7b437
SHA1e18ca50994bfa76d0e6e86d95c700b07d949f36f
SHA256e5f0cac3d653b4eb5f537e1742a0c5767373082bd757a7b2bb5e5135591cbd92
SHA512993db8643fec3fff4a4e138350cc06c34e5ea0c1ca4e10ddfd5a15fb07281655ecc60fe79439181312e664acb23fb41ce2f72ab756fb826718d233bed97e1d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c67a3d3684ac64f28c1feeec2288ef0e
SHA1b2758e07b4a6ad630ece3e573cc92ce640cd6ffd
SHA256e62bc17d1219785a6e9a1450ad48bb7910d36ca235a9dfba7fed9417379f474d
SHA512fde8966efc0e5b2ea7f0d65eca96c06363865da539c63527f2d2ce58a337ec8e3a82a5b5e85dddd2bcb2a1153f2e0c190b47bca503fd72e1f1abfe62d2c312bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5143703abcdf089c0028917c816075af0
SHA1ef6c198bd0769be274648f31049428a33e0d93db
SHA256740129d298c07f6d01e6ff011a05a5b3fcbbe45f7302f5569d49ddaeb28d34af
SHA51285500cc5bd6025b5bcb82c8a2b37f79c955ec1c8d0b726275731bb7cb71866712434caaae2b67335eea19cdcec328dd9023ef973fa826ece66c4fdb9cce0c8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c5b92702adc7d82e4d849213cf5fb4
SHA15e10a03b789bf8806a5c94d2840b75b3ce96db33
SHA2569248ce09b1565492344188b9dfd493a4d75a0ae1b316906a0fff50a9478af1c2
SHA512ce4a5a0d05aea5fc09598d3947b660dbce234a23aad8b4d229a37163673a4d33e4323b4d515d85313a30a66bba204f31f88e265737fce629ccb5fd2194e259d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f2c978d91ac8b1e57352bc64bea98f
SHA1d9bc1bc442f413f08e0743812bc41eeb5583a65d
SHA2566cf3a74f30ddb40d3e00121cb94e744e9997ff5c91bc9fc7f95216a51cda76e9
SHA512edd207710abfbce5e191b3ca4919b8ef9126a1b0630bc7257f05e83375d37c84ee18c17de1ad4d77ecb27f8d055391fbd0145b260d83b47351636a5a9bfab888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530342ee110ae3d0e184ccbf44e41d224
SHA1fff183d20e72c2271f4e31833c257a8df568983d
SHA25618b4a92abac2ab0c860251c84e3c67a1e9c065079bb96bbe3c030b774201b5ee
SHA5126dfaa029f47fb9aefa36821b7fc30586a30750aaf27effc7ff87a542f8d50198d5fff58d37cc9d14c21a7ad8f67cf677369e5d790bc4406f4baee3738c5ff86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23df9219e12a2faa86558f71bb3a15f
SHA1aa30852e739f033f131b43f0abf9dacadf7d0a61
SHA2564a02f416aaafbc0309f6db5815a29fae4859df658215fa14d61f9b1169f4cce0
SHA51256cf39f1edea61d5de4b0b7eba80c6a782a37a295819e5fc7e40cb6ce30d4773808f42b05463c9d0149c4aae7a0eed7ac49e784bce29e2a1bfd60f2ce0e3ffe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ecb517946daee70d7dd8dcba236325
SHA139c08173d80275e64640a7ae18e6a6b193cac3ad
SHA256be09a65d52cc6b6bd25f78f786946d59b990947e1821ebc71d0c5b969116e69a
SHA512713ba2f400e511dc751095bdbf5a2ca90ecce26e0a7782971183ca2d61ed9f5df717fbc7d5e3752afa0e694fde35e9052bddb252a4ff36d85cabaff4fd515a80
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b