Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
2df8bbc1d346e15b0bb62159f25a35b9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2df8bbc1d346e15b0bb62159f25a35b9_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2df8bbc1d346e15b0bb62159f25a35b9_JaffaCakes118.html
-
Size
53KB
-
MD5
2df8bbc1d346e15b0bb62159f25a35b9
-
SHA1
c090e84b95db734e6e97eda5a60604e187e8a417
-
SHA256
14d18fd28f55c2dbcaeeb47e2599261d8884e12513f6d50ef87b2858c491ff43
-
SHA512
6271778d9ccb9f5130feebeb757f07453c5e646c00795048223bdc668b4e91acbcd679417e214c48a1912848cd0e699d7f1f59295fef775d14ba0d5989bb9694
-
SSDEEP
1536:CkgUiIakTqGivi+PyUPrunlYy63Nj+q5VyvR0w2AzTICbb2on/t9M/dNwIUTDmDF:CkgUiIakTqGivi+PyUPrunlYy63Nj+qN
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BE37F11-3DAC-11EF-83F9-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ed253f3f1fab1b860de42f435afb237155f34b9bedfe6ecd21b75b50b5efda1c000000000e800000000200002000000048038c98b2c50529488ec45a0174c46455952f93b70b65c2bb65ff2d7dc047532000000098df9f9d95059281e74088409d8620c206fb4fd2f8f41886a2a5fe7d31f3da6c400000000fb3c1db5f44cd9a2797fb0204668b2e36231f12da80c6b9971a26f1f3e0480f042f758da6ab86bd8d530f595bc1f81efebc7e3217e6d96344ad60a3ee72580d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e041caf2b8d1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426661355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2392 1956 iexplore.exe 30 PID 1956 wrote to memory of 2392 1956 iexplore.exe 30 PID 1956 wrote to memory of 2392 1956 iexplore.exe 30 PID 1956 wrote to memory of 2392 1956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2df8bbc1d346e15b0bb62159f25a35b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e73b259bddb1f4ef1341fc3ac9ff52
SHA143ae4c64e17933d4c1c8767f56387f62c3afe3a0
SHA25657fb9e5df51329c3d421d9e2affedee590b04d3cc5d79bfd477af906878b0c39
SHA51239628b12540f7e3e9e026bfdcfb5bf3057e497e1155d166a6c38717e0843aab9dc73d29506e1022f79ceaf9a54ff0b3e6864757867d23468db83ea92368dd58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2a664e8dbb740b4f8de117e5afb601
SHA178c821264ce0a47f6265cd58143d2b235214f10d
SHA256a430ec21f6e21469e1741c703737bc239409293224960f96a9d3a6694f62bcf2
SHA5126b8ea9dcb91188a5a65e789f29b7c32e94af26af9545cf74ef39ddfa15d2a699f6df80375021a94768f499eca2fbd9d4df2a308ad953bcfabd1ed83cf01363ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165e3d4702cbd9544cdd362cc53731bb
SHA13e82781a88df0357e6823265b8201d7b829176b2
SHA2566d082a6f96dbf4afb64fd4ea57ccf52a7dacb3f4899b772b6323a0ec832d47f7
SHA5122631db0edcfdbbd169f58e3637ff1af3dae7e6f23471791aaef877cde7e19efb0664abedd9889a36539784e1f0c104bcad8096eb11a4e26a0364a43c68509bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f1a52c3066c23898bb3b958778f2fc
SHA14802cfa1ef6b2499cddc71aef24354f79a01d000
SHA2563bee7574cb3cfc6b43eec76aa4d64451b88b50fbc5c53dad311b4524c1fbe98a
SHA512e7129d4103ec221d07209c78edf9131af6fb7a73e2ae11654688e3163e9693ed3fc1f4b61cb1efc60abbaa6f674528267e8356eb360d6da0d44936780025d462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c117c1de8300d9972966031598a8fe63
SHA18f0baf4a76517e0c79dd8208ebebb60929792f2a
SHA25686dc2d769e11206b8158cb24aabebf95fb208d916fdfdde8c99332e0556e5d31
SHA5126801010e39014a04820334a8dd9fde0778584a175367aa1859ff85f04a6bb767724b10d4d11978ddaa0dc230a23184a5dd1c6f24ff849df6f2a992f585a8de37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585201f8fd7edcbef150c170c629d77ea
SHA1f543952673a7a8fd4358a28dd1d32c5775953865
SHA2564bce4ea51dfea446f21bfb271955272eef222f92ccb905d519d8ce353a67b193
SHA51225818e15d4c404241e3858ba0d0a7a3461d7a7deff95708a6ddf74ac91bfcf6581f36c952e549d42dc4aafd6bffe5a6d37bcfceae8a80f2912b5aee0dbe7a588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533bbcdd1ec03a81c124a256bea1604f7
SHA13621622c762351034f7b56a5a49775fd7934a9c2
SHA2562178cd9eb4eb338bc926e181671ce1efeec5b44d0777e2f47bdd7f53badbf061
SHA5129e6987f19c57a757818d948dc55d3c5779801bd6c70d0ef005d26142f61c4eb4616eddcc21d946b4ed5e5535c408b3c805463cf2f1683801bf5206a5f9e55d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3bfb885d00c664d90304bd07b71fe6
SHA1ea9a17e1beb9e978a12948d066df157cacea0205
SHA25623a394d849985e535198c2484ba59471aff9e7ee264e7c3debeff755295a85a8
SHA512c0a2d44410321149cb2de94efe93bf514299499c703bda7759e9530c766ba910a80adb16f25e072e57240076a339e47236058353c25561c93049d975d2894476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3e10b9619d349d04aee46af7c67742
SHA1d331ad8aa8d4e0cca36383587cd5dcb7770c9ab1
SHA256adbf5ad2ad74f82ea3aeb8b6946267a24839a105d9a137db644a2a3242978e52
SHA51211c3f6fa54824d5fcf83b195acf3539d16e5a97131e2770a63502a144fd7ac68564eb2f257dd989f1946352233e5ca652435b9ee113741216db7c49c9e3b66b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54129d2ce18d3ebd59cfb74708e4af99c
SHA1d5a48f02152db926749d8e9b92c8596fdfefb005
SHA256fcb3911c80c3a51cdb2717db6d9a439a5a1c21ae65f3198655befc5000bdd139
SHA5129a29e7b35c4f4226500b81b532b101335b9196edf35f60fa9707d12c2fde7d005d7719855229ae0e217177986a39bf9ef0336749b52fd9e07c00a28852b64c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9227268df4ae9e51fdbb507be075ea5
SHA105ba7b7ce5d93f9d363417d002a0fcb360aad919
SHA2560b92df5183db155a4a050785ed4392ab71cef48293a88af4101a46ffae91c61d
SHA512b6b471beab9d1f8cd5fd4d68e47f127fa888882c4ad6df89b9f17e98fb668fff43a4c5a311dfb4f79867a7e580181b6abaf4e9f74ee5d138e00400e057254e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3b4015377edac3d31865b6d8da79b16
SHA144f0e618fffedb82cb4b832f28eb4655e5e4ad80
SHA256cbf4b3296a9927f4cedce33f3e9f6d3a0b231ff2ae9915933f633d0c81380753
SHA512daebd9bece738fa7b138cb742d2e80e266811f0be69fe10924eb9f1a426b59c7c2c726a9fc0980ff8f80ac80b0f9a5c4790588972664b307c8fdc003580a48ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fae29415264cc1054740a9fa509918b
SHA1325e0dfe14f71265af28e7569a31dacf71314a21
SHA2566385624cdb9482a46c2354527833c1bc2915068928936f89434e3c9265208aed
SHA5121e82f39a367115a152173e927b61f5807b96b6c95d670e8b9d1b6a90470838a90a2cf5a4d11bbc02dd923c06b9101641d769b6004872c2f91245dbe55632827d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a4dd9433af4d29b0f0483e5f0282aa
SHA17b16edfe896ff698ccbb5ccb01689c6a99f09320
SHA256807913b0a4e1edb11aa2f4e182c6461fbcedf9b7d9f601a98068c105e49f3d1e
SHA512ca50d31913bbe8712ca5454d8fb3cb3bd2bd1de3a9666f63aa191ddeb9a1c236fb06a89229a7bfe2fa6e451960a84188b5809eb3479043aac3ea8158788a30a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f232dcaac6774c6829c2082089da947
SHA1b5d9cbd18b519ed2aba6b698cfe331667707309c
SHA25697fef0e435dadba8681325a0bc16314fb977c6637281a36e05a5b35fcbd9f75f
SHA512affabd3dbf982fb6a40bd92193029560044067183e13cf515ea8196621a6c2c69743944ad7b97e30b1babcee0e30564f2f1adfbd2b36bedb13ec8630f8ecdb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58375c042f3995ece42237654ef5fe5a0
SHA164677790a31dc4f99ed82195be232169120c2d55
SHA2566e2db31af1c6fc70daabee177e34df342c983e5bd9cd7f9e32e6717807696c80
SHA5125a67f68d8b3b9a5bbe5164018b19f2c16d7bd2639160a26911d3a94bf7fa54e275abf8e2a8b943398295389e5c557255e1e6796136763d4ba8c8952dbfbe7f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2ac86c9dd3ac28ec5ebb15a9bd4d65
SHA1eeeed02ebb3f0bfcac6504f66c31375742aef586
SHA2566651ff2dc401c1fc602b997ffffc2d0ffe40dfca132f89e91fec0b1180bfeb93
SHA512123cae383be5ca863c961ef0fb3fcf65f79dd558314b90480b9f935ffaa51de14b1d045a5cbaba2ba738ed26cd1d44dc832cf6f37edada4904d49798076127c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795221b888afc58d1b20ff02afba9e46
SHA1c9c1b502653c3bc496fc9ef6cc27cfe3534af1e0
SHA256516fd0b4fde8d9cc39feab451383e65265b13ea2ad93073c017c78f8a9a048a3
SHA51205d09e4dcd726a90b4c9fcecd3477a88323d27f0b50158fe613ef74767f66fe9c608e8b5e3815ec9b3e538e7286b595d50a5a5b5cabec37b35dfc186608da759
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\topic_starter[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b