Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
2a0770d13f966ca5f84c108c0f22f64a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a0770d13f966ca5f84c108c0f22f64a_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2a0770d13f966ca5f84c108c0f22f64a_JaffaCakes118.html
-
Size
53KB
-
MD5
2a0770d13f966ca5f84c108c0f22f64a
-
SHA1
4f95a955d419c31953d4a0007f4752f1187504b0
-
SHA256
d8c10088e90e152efe4572081d812c304c61b8bd49c0031fe99686ac238daaea
-
SHA512
be6de8ef851c4dd6a86e92fd7cb516dbe82e6bef44ae0f9fa61d275fbe701424f75f5003ca4ce74bf838bdc3cb81eeb7811df27728c67331b76da76406a1c5ff
-
SSDEEP
1536:CkgUiIakTqGivi+PyUzrunlYX63Nj+q5VyvR0w2AzTICbb1o8/t9M/dNwIUTDmDR:CkgUiIakTqGivi+PyUzrunlYX63Nj+qx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7098c54bc0d0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000004835ee440f43ccd0ce69afadeaa5afa824c898abcef8eb04159aa015ef005a8f000000000e80000000020000200000004a18f39166e520b0997e9dfb3ec436ea6be40e2f73ee072992f4e784ab77cda1200000002b2fc9b9927d92a28b8c2bb49fee93b83c3208eaa33903d3d599b26948f5b42e400000007b3f7ebf137f69076b6a2a66195696477725a7d0ae623ceb11cd59060778eadade5473fdee21ec590c5a87e6904163ebeda53d53eed9cf134662cadcb026cd39 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75E4DBC1-3CB3-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426554563" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 3024 2712 iexplore.exe 31 PID 2712 wrote to memory of 3024 2712 iexplore.exe 31 PID 2712 wrote to memory of 3024 2712 iexplore.exe 31 PID 2712 wrote to memory of 3024 2712 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a0770d13f966ca5f84c108c0f22f64a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a695f24bd856b8947510e6b5bd7426
SHA107e7df9e2e4b407569063cf8bb025f6118785de1
SHA256822998be032254a9cd9e272a6da7196964576f60a45acaf433e30343a68bc9bb
SHA512bcafbf3aeb14f9fe461d2a72c813277835fe2cf49d6950da2d7e9ab77204fec27c26da5a4df56f95a2a45b928845ed159e57ea76140a3579d228b55171649c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0162a2dd18e3282c2b62fab3c2e864
SHA1d37f74203d254024afc10d1fd4503d98577c95d7
SHA256adc907fc82db86c0b3766cbe46c3d4dab852e39f6b32b2e24292229273798394
SHA512e5b324861ef27f7eff1166d2753cce2cd3849aa9c07c23ee1cecf1b1578d970cd1b21523f9f4b720813a20c49e020d7b04a5c48a504f1974024909cfb3fd3741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a67d31f6ab4e9803a1d0be859ab3b6
SHA1ffa6e054366f8602c16015194e00e43671837fb5
SHA2568bafef4f7688922676fff7e8ea6ad528d3a971701edaee76d5e7eda98cffbbc7
SHA512a9a6256fb2b37c4efe16855a0178eb309a89b91ddda7dc85a0a031d903b68597509771dffe9ab006520a60bbeae0101fb93f1620875f42c29fc57c50650a29a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe23f5fdc2257b5713f0cf9053353b69
SHA1848410287772e2c3560fcabc77264cb820a48683
SHA2563e8db810bee08545fcc6478e1f1e017113b2ec7acbc63ecce5b1024946c22b7d
SHA5129efe24fd63913f869eb0f754e59794b33f389563b5c8e0e8f455841496cc45b4796cab47786216ac4ac26da2e6a4d4fdf19707b903ae3b93d99c2938c58cdb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7c2c7b33527c7a76b6ad60b9c5fb8c
SHA16df1dcd795f6660ecb88cca28ec9ffaaa78050ec
SHA256831347f9b61e5a33f1d88853b9bf5752d8327ebe3a196e0fb9d62346ab8377a3
SHA512e6e5d0c55f42b6695c02147d5cb720929938ca69d33f45050ec14561dbece3ccee40f679813e0f8372145f5c1205e70df080c750ed72340c35ddaf3453ebb11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848e208a29336c15149193d6ebae0fe0
SHA1fef22e5b5942fafa2b0e04792cf2377b7a39c3a6
SHA2568678dc0224a7a99ad28305a31247600831b7a03dedd6a8197401523c9b81de36
SHA512b1ce6f84f0d9b3830fe8a1dfbdbcbe9346c273150caed5c4809b044b808c974a25d829b16cb6b4b377f04f87f8555850605b9027d1f8503625252a321f6b8dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5514e5182fa0647150886d1570ade16a4
SHA1c91b55d00bf2c562722f4d172fbdada992c6acb3
SHA256751a13b30151fbbe39c75185281512f3eef553694425cb76d399b337fb42b379
SHA5121cb503e83cca1c8b7cb3eef7dae401cebba0b8306e091f128ce48072a7e1aa6aec2ab00755913f607602f505bb57092fe9d99e40948129b05d5c9a7255686915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc3d25786baecab3b06b9e17447293c
SHA16ad4efe29869a4f1454f6eb3cfbe5d4430bb0a30
SHA2569a3a989dfd07973afd7d5a9989f3e7329559c599e59b1cd0174057c270522367
SHA512b53b436f326c96ffbc69c967d778b2afcb60df3a930f1d7e38cb3913629c9dd43a460e82f5f375602082b15dbb36136d39d84d226ab0ca40f91b4f17a1d99d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61102c4fa6abfcf14ff631d414c7d95
SHA110021fe2895b036d6076b32099e9bf3f7f76f54d
SHA256d3f48ed13fb46972a9ea4139ea9f0ff0eb4687903267ff78cbecb794ccdb8f24
SHA51237819049e1e7d3dc41019db076daf0973106b2863dad695d6a3d0b8e20c6e83f5608347802558e64b6c2355e1bbd9ba2c9f02329157afc70909386d9b87d209e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55499958f2b006258f5daa0c73640531f
SHA128ed197c58bb6801b541fb3e4b6968cd5a34714e
SHA25672f4dd6ed03be3dee115ab98049a7643ce72bf51529189f77ebf0ef00412464d
SHA512c9d73525a38c3eecaa213450db9936ed37ccd7fd7a654eaa242fe51b51892ca2ef020c40358a052a568e54bf2b1a96fd6504df82cd6a19b6a21055b0212b83d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565769baaec7eee03dfc4c18b83ffb323
SHA19e739f2900d2ff3c05aacc6f608ea47ba0f6a020
SHA2567dc3e1cd203eb4c299102ed04dcb9a7e95d08c0dbe2689ad7ebf451e77ab752b
SHA512571238eb37814e742a8438e12c045dcd30b673aacd5b9c0aeba7278114b5eb42f6bfbe53e087fad5517e8029c062b2fd75fcbed905436631e8267e576944a9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7f6cc52ed671834fefae70895962fa
SHA1a1657174930071c704cd36f58834a2dbc2131703
SHA2568550b07cbaeca50eec6ec4d16c480c460cb8a64331302f5a96a9732f722d5f34
SHA512fa26d289f0762b17c9949c8424c96acfc918fb071fa296a1219e2c0b1926519dde214c31f7cf53dfe70e623a321970796f3e40e9eb79d0f798aa3f3d078a0527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583dbb133bfd50ccb32083a1d9b92d624
SHA1d95d4f08af0dd3826f754a04a088178d452f8cb0
SHA256145733c49f3618793377ddf7cb70f1c8bdad056e49906b697d43696831597f95
SHA5127b32d682d8c38c1e2f10edc5dea99e4b8976e3bb2db13ba31e86ec66fd235f921160608aa099cc3f8d09ba513a5c503d0b28a15bb09f6d950316b5fbbe5cfdbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525cd03423ceba80c3c14d5931328a9fb
SHA1ff763d172ad2f3739e461991e4299cd64e0a2cdf
SHA2567d1ff44edfc0c4c3f583b1dbc5241a0df3cfb67deb35d13c90cf4ebe6b0127c5
SHA512184c580dd879f2d434124fa82838e3ddcc81becb830a4259a66c9ab70e68832d0c3c03dafb5d0606bfd9b871c4ae191a3ecd5af818c9cbbe65b4e5edc398a9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587904188ba57d550e07310f3838da7f0
SHA182d6fb40bdd229763dedc122dd34988bfb95cd29
SHA2562e5a9c435b1d416dfea534a7176ab01c9352e0416270ed31a5d6441ea388bfae
SHA512b0d4e531966f6f1038508c5a474028d84cd153336deeb560eeb4132cae372c7d6c91311e761f748d81b8a33d712c8a8649bf80bef50685a29f03763572188b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e636f6393ce10faf9caed2b65505c6
SHA198c5e89b2a2dbec754874bb9fc0954060520b0ad
SHA256bd57898ecff0da83b3a577c5b5dae8c4913bf83a603b77eeb48db94b019f73e1
SHA512e3b9ff5e9391a49ec92fcce6e6cd38b8d910742c880794c5a4463c59c6476abc3253c74f758a7a2ea740cc871dc9f795337cb73a35869d5eeda2f2b13c34e9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544987fa743d3ee0e34cb98fdeae6ff7
SHA1a840deb7e73814c96d96bec45151edd2e9934b39
SHA256543c7257ac767994255fc534c497f35bfa1a7bce977b6505fcef6b85e06b4b7e
SHA5129f95f3c1583c8fa6da02b868bea7ce4c6a8827c936a5ed15ceab389e23a29479bce901fec7852fbceb002e85c81968de886ae2dc81358c101aca2d63fdf3c537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c442673ab4e1d88ea9d1f27d53c16150
SHA1f27435f0a1b1f2018656e64dc978997fdcfa8d53
SHA256d1b1aff0bc2059ffeae02cd406b42d74610e44edb36ee3a3d30b663a82394593
SHA51285782a8fade00e5931640ff2bcef0fee6f7a683efd35be384f3450d632af950b9926e634d0a3bbb0d70079209b627b120ea8284c7b22ce05a7c03e3fdd06ea57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508be3f19fed38dc3d86367026909f71d
SHA1db8d0756d288280ffaf0ab4a1c92575cd2bb0987
SHA2560f939260600c7f818efd8a1c3af6e1583f597e225a4e8c5a0530a5ffcd7504a2
SHA512c47fc1ff659975b645ed5a8945a01962531f3175f551ae36ebbb4a193b664b2cbde268dfc7d0c84bde57533d308abb17e8238c6c30ec8baf7a28f721b4e7bb6a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b