Analysis
-
max time kernel
69s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
2a0a007a39ea6277531554864921d7b5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a0a007a39ea6277531554864921d7b5_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2a0a007a39ea6277531554864921d7b5_JaffaCakes118.html
-
Size
27KB
-
MD5
2a0a007a39ea6277531554864921d7b5
-
SHA1
c60d715fc740b8ca6c8c0dde31386988eab288b4
-
SHA256
15d0b325df28dfab29043a8b109cc9c654edf42eb45f8b23b5a9a88c2e95c5b5
-
SHA512
7d2f51116eda245d8174ff9a4b72f29447eab9249bb1c2f2ec4dda3de523ccdac3488cc1586c0641d20d57c59ace27741bbffc0165ef2b036cf087c33e8f2d50
-
SSDEEP
384:4+QfPFd9QZBC7mOdMBqJ9776maSkbSRK7/SdMmSOk9KfpC5IgSnbmFe7Acsjbs+o:Zcd9QZBC7mOdMgZpC5I9nC47bPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ecdd0ac2d0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000066e678686826c53ca847ac0d42e19cd46e532cbdae4764ec686cca82db0104ee000000000e8000000002000020000000f2c8b006a9e34242bba1f81eaa2d3b024b6e51b5b250edd44f4abbde0705fce420000000e91a5fab19132c55ace79b9cd45e1c1f4192e2fed296ff74f436fd4a5daff30d400000001e4293cfcdf52316ef06d003acf5a7b687ca17a4237ec485c78479f43923377a9c09d0892700c903722601b493a08e8738296d700d44fcebabfab3e310940b41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{349BD631-3CB5-11EF-BAC8-7A3ECDA2562B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000cbe56ba58ab7afa5c13a8d5a662ab2e133bb438e6a76d9844f1eac5d370212e6000000000e80000000020000200000003cf700ba4fb4167a3abd437d41b57dabf9b29215d5a1124c7c118008a00562d4900000008a85858a0c36cbf56ad0059f3ca88fad65958439f643c413bf39c521a066344646cce344782574a40880f877edb3e1e6adbf6f86044df8f6e124baceaaf50eb92a8910c035b5a513dcb1a26c05e5e146ca604343dd55a7444f10f3d7f3e4f5ab0f0cbd97ea2a097e3cbf886f9038e5d4b98eb5a7536b784d81e4a8c5992cf90e77abb0b8c7c9d71ef3e2dac6b00f72e140000000e7ce25ca150675a414e1c04ba89a4b15f301badbba9730a89638581992444377fb3b97f25fe3804b6512a1f462cf1c2280ec0cd9ba9cc63242953185511b9390 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426555313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 856 IEXPLORE.EXE 856 IEXPLORE.EXE 856 IEXPLORE.EXE 856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 856 2056 iexplore.exe 29 PID 2056 wrote to memory of 856 2056 iexplore.exe 29 PID 2056 wrote to memory of 856 2056 iexplore.exe 29 PID 2056 wrote to memory of 856 2056 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a0a007a39ea6277531554864921d7b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e5e20278392460648d4d60c9eb1ec5
SHA10bfa349ca5400b45b3bd62f9ab3f5eab06b5753e
SHA2562541bf74f0d7cc1a273ffb579ac4e239f4695236f4dd535e2de31c740945f837
SHA5125a4505f47bc624aaa20bbf796370881878e8cd975174f33b3807d489fc7f6fd906b3d28a156221fe38e2ef54fea2694cf9f2923b1380510922ce90e67ec70c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ccc00ea9e07aa62538d3e433f8d1843
SHA1511cf103243992c45e6df6ae582ad5775999c7e1
SHA2567e463f85b10c5ca423bbd69e606f636e6762b50f29b6a5232439293cea7717dc
SHA51271ed8eebf2554af02ab245949ec7b99ae93ce05147fd5e20c6411bdf7cd59f5aadf1fee934e1f0f7c17ff4b48daf327f4aa598440947bd60a519178fea4bbcf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b2af648eb1f620e3abe82d3d284e2b
SHA18c35280dffaaf19e277805e42bf2937cd944bd2b
SHA2569b24f0461a94e8d52d5af3ffeb41f6d2810e79b8ee3e44d3f2548ca19e9b624e
SHA5121da7c17f8ebf5bf20a3e7a2f9fc7f1a4929c4e98569138327fe2e33f318a20f7b53f6157e96b6acbea983c5b2937abdb6a44abc995d3d56587a3127fdc8c9432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575cd01bfb40e7bfd558d6d5bc55bd887
SHA1b58a44133215b0186d0a27735ec2aaa2a56fd4d2
SHA25682763dbd2a91df76534b2ef78937246677e65731714f9d081cf12bb43769e6ea
SHA51237c2fefd09d466b0c4d5e7d06463a58a9abfff3ceeb60a43aec0b654ad759fa8ba02429abea0bef425941aab4e5b3bed04417e498d01a32ffa6cfcec5747f36a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574cdb88681002cdcd9f3f66afe2136bb
SHA19a4c160f18e26bf460e538e7ed0a76c050e01fed
SHA256d2b18ee97d4eb518eb736a4ee7199c9c6dfb3833b90bc33ffb281c848e7f935f
SHA512fefdd8331070be1e7c3c538db7e3662ade63e2d69cb42fe70bc492e2fb5001f5bdcc1c6dad68fbb31aec8e71550b0241acc2a104c528afb42c0b6de376d4c2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51452e26c7cb0e2e2f7ebe2de429c7bcf
SHA13e5de50019dbc71bd234f138576031cad86ee6ce
SHA256ad6e1b330993ac0e7646574f07583bed68a270d084c472458cfd4a8459a5f6f5
SHA512bcecb4acc4fc0528c12a13c70ec2f3b5e33e539fd8036d8b745451a1019e86cef70cdaf3390dbe83fd7fbfa6c9141f697d7366c045959d5e1038f2910f3ab63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6569e02293b50b3cb62dd990f34798d
SHA1304a472bf4e95f5458dab3d0af49f15198e0c83e
SHA25645602f3837345db2372ffadc3f1f2eab08c7d99bfd21f9a6b989ba03a49167f2
SHA512af143070f43bbcd1f7d9e97f9d97376032c2748de63280f8c9ddebf440597c6f81a32cefc1503334383c51be9719d894ce9f9d0fab25d31729068699ca682659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf4648d1a06cc17f55173eb258bc412
SHA1d537464b0ea9e27313a3b1a40867c958e00dbf03
SHA25699c909b8fae358c92d6565ba576595ba75f147a3babd605f5e332008ec48623d
SHA51293c6b92c3686d10bf8493c51faec74089cd002e1de4781ef828b157a8ae918311087cb5f22cbca849050a15c17087ce8ce3850290750248f47fa6831dfc43233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562087c894478e79e913acc7d94339ca7
SHA18ee832c5dd00b15e73dd1396accc5fa5e514c242
SHA256e5c7b424ef1b0d0ee0edaff013fdc0fd385fae72950e42ca24a7ad10d4c2291a
SHA512b58508bf20c8fa6bd1bc6eaf9f525dc953ba7c02043b31f84572a03cc4faceac4539e4a41a2fc4f988afad60300527db4b16e33efd54a7938fb80b6d253c9005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7baf2b7ed3bf6b76f2a525aa4d8777
SHA1f997562805f7667150c338cb0257f966015d5e9f
SHA2569ca6cc946c195d643ecc4e94adec0e74169880cadfe10f9bb61f2d20c5ae6c43
SHA5124a4f680a898a7e13e6dbf83de146554229a52b55abd7b9bd9c518c8fc6259ab7a8052f083e4e8a8539f84bd90ea10766cd8115b16e22658a492fc1ab26a7163b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bceeb8c61b13c8fbe1b85c82d00e12d
SHA1d67beaa52d5d187127de3bd44a3df562857b0b83
SHA256f1753c9ea3b540988abf7d15c0e46667cfba171336b026de15ff8eae0078673c
SHA512c223181b982c8b2ca1e5b22034736d6148bfa2ee1ccb75b4f37b930d230a4d243a3ce4b4c47ef67366f3e65aee07c743551aa88c53ba4bafdfe0d775163948f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24a13f191e605dd8abb98b7bd6f0e34
SHA18ded15088eefe36cea041e6a6e979f6f407af387
SHA256676fb61f758cc1d326704b24d68c59bbf1d3fce2c29569ae2ea64751b1f7cba1
SHA51290eeec867341e313d765a0ad9a2e0571025ab02074d3047764f152b68daa59e6e17f9839d248a1cf45fa74a262d49542f5dd5eb927de2bec09b74ab9a3d3e34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913dd964b638397a0829621a0402b233
SHA1809f450de3538be99f1d8155eef0bcf908576df1
SHA256d348928464b753190f732b46aca0180023b0dc7aa692238c03f58607ebaa8156
SHA512bf004145c9cac28ceabeb13fa43f242ff087decd3b18f0882aee3dc3a52650d7ca36631407b89bcbc624fa475e4689b5667c1027e9dee06fc89f968404fffff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d51742347f642db39e2ae84c5aa398
SHA19a222cbaf6df601e7224934863c083bf64441b43
SHA25646bdc23ff1650d75fab3f3de808c11e99c9804fbbc8d6f3c7d58c4ac68ff2cc9
SHA51267552b9645d2f5196cc82c3be95a2032fa7c3c81e0d993cf3be9dcf62845bae44703c40929d7fc54979ca401ab8e0ed8444c9f7d25255274e62f7ea4f7845b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b60eace211a4ed93b19b2542bd85fc7
SHA17196bb2ce9d3a13a1d18b47ce0ddb924831fc34a
SHA256e3cc1bdd2485961b6c5db6bb01aeb40c76c6f64f0d6eb04d5124af7cdcbff4e6
SHA512d1f638386ab1af6f1d1a8bd392bf8fb6619fef43d94308f804b75f73879fb6701fc3802982559d250cbd6ff87a163a6f67f66dd4962373e078cb5f4f345ec6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887a72d1ec8c6201b6f68cddc8ee7dee
SHA10effc2002aaa44933fd9bdd37a6aaaad82765b41
SHA256113a841ee6aef16d8eb31e5d12d05c450b5838c883926a91bb57d23b630427ab
SHA51212632d2a6b1be0d7fd2ccde19be5c7a2807325f2b01bffc0ab6d7dc8fd082e87dcca2be91d69d60d2b7223b67fe2acd9125f749a6f30a57368193c26263c076a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b