Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
2e3ef40913ec8b6a5899178e8dc00e27_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e3ef40913ec8b6a5899178e8dc00e27_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2e3ef40913ec8b6a5899178e8dc00e27_JaffaCakes118.html
-
Size
57KB
-
MD5
2e3ef40913ec8b6a5899178e8dc00e27
-
SHA1
695a3b98a9e5cb2b7cc54d76490d9e8f668b1ac1
-
SHA256
18285d5ec76ce81e40e95ef22354bdcd16d85f493f68aeb2b674773985c35b86
-
SHA512
df21038871d82bd29aa1eae065cdebd38ea4bfc6d465b6796fe5bc6668c3f303ebdb9a493c9d33c171f559c9b84118c0945a5eb7f650d7375d94219942eb1e7c
-
SSDEEP
1536:gQZBCCOdZ0IxC6jPNfjfRfcf7fKf6fmfJfGfRf3fwfmfLfHfqf/FfqfHfsfdfTfd:gk2H0IxtLpEjSyuR+JPIeTfSVi/01L6W
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACD11321-3DB6-11EF-A3CD-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000118314d799163b00d6a6690a5ed05dcec4709126d4e736123a4b682925bfc0ff000000000e8000000002000020000000e0e8bfd8023f9abe6f0c8e81c3e063374b88049a90ac79b62fcef52e179ccd922000000009acab21e72d0843212ff0db3de665de2caa883a13eabbddf3d51ed447136c48400000000186b54629d6f624a7d2dc501df796ced29f348ba0f58cb2b9bcb7660438facae3dc2f0106753889a365f653975e9297617c74a703b3a45b042959d8390b47c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0479e82c3d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426665894" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2928 2720 iexplore.exe 30 PID 2720 wrote to memory of 2928 2720 iexplore.exe 30 PID 2720 wrote to memory of 2928 2720 iexplore.exe 30 PID 2720 wrote to memory of 2928 2720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e3ef40913ec8b6a5899178e8dc00e27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580064501e48b9aafffb6e2cc2e9ee302
SHA1abf35e5c424b565b9ba8a8437f55a8df7fa2d565
SHA256df7b5fb8083c32fbbb60b3344da41560c41e659cb8a5adfdc797967cc9421b0a
SHA5126fedc1bdd444d65071d122692d75a6e9b0519cded06fc5ef1ea072aba76d409601ccac96f873f2ef5f17d9b8ef1edb2909511bb02d549d1743b0c0d80000ed52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c92286442d4ecd677d301a31cbcfc2e
SHA15cf31929bef4dafec3b89f4602d87eff3ff115f8
SHA2560ccd08a51068b374f6159a68d49d17eeb301a5b6b167b3257112180e937ed839
SHA512261955d2b4ee6bd7e6e1e8131af2e3e23e85b686c4b7e48a6250d72fff094d6ac1533d804c66be1d999ddab91a074c962a587a582a755a05e9d999596477f3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb685a38ac26737d474f3b4f1a8c54c
SHA193afdaa07bc843065e7b7cf76beec9910684c372
SHA256d8c831e510118d8e5f7243f3040d7a96fe9f625f4da4a6d9f3062691203aa5ce
SHA512e61cd505e6b53fe0f1dd91834b8e87fe08b5e3f082825ae13b795ccf827b3f123c4a33e7982053d588036024eeaada9c94922c482885a6d7dcad7821d934179a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0a823999aeaf2a34c75f31a1b1eb1e
SHA127ccb2056f6c6e71de9d1c96567e5901959e8d01
SHA2568141c5b4b1799a2c6d24ed6770d8a76bd23f0063023987203ea9b6fcd122ee82
SHA512ab44f1b6cbc60126e30be478c2039ab8d1c385f3bbd80e97c0ba00469392f72cc677e4777abdde13b94f6d8b4c4e488089febdfef2a94ae1c90e3c8cdffe81b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56aff813ea378cff1cbd32d3d4dc75f
SHA1227faca84a4fbb0dc21a4e5c846017b21787c895
SHA256e0df8f5deaa35a5caae991007b2c6303b86949d9c74da075fcfbccd8487aa37f
SHA512bab29c987028995f0e5244b72778c53a985444bc85e725632328557d0a9c88d9822bf091e798a77adfbc571b081481f9b2a930a86913e6e2e341a0a9d2a19296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726e27bac2fb8247cd3e270f3f9d8533
SHA11aa092f09089dfc6d9405c392abb21b2d567adb9
SHA25680bf17fb154bb46281e8ae1ad0ded22655d5cd1af378846bf82c69218efd0e51
SHA5126da124832a6118d21f5b864e299d0bd9ffbce49de1bd0eb9b3a5db568fd4ab9d7fd552792a93a18d9a96dc9dcd33a4628d81c1586d3ba879f6d20cb7381c646c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c3c3e033dba185124f00324c6eb360
SHA1f2de736082219dd47f4d6c258b7177c50e8f4759
SHA2564e191f712e757fda9c459f7bf4f07c9b55968b6829815383be2ba091276b316d
SHA512c964843eaba0be78c352d6afaf05e7f4472e4353761b9193298776e0feffe7719bed67709dd7ce9dc34da375663b039b0e17bfdcacb7076b8a4459bb8ee7136a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0c6a18ec383fd7248e792829ed0c33
SHA13e4d44ef5bcbbc749abd68faf08189df89fda6c3
SHA256ca4a3ede2987a44421838d27d36c59f085cce0203dbc69922b25e35d254b3c64
SHA51209ad1b130e536c6be503cff10403183412a5937194b9212dc68a6e321c26120515998e9d3218ce0c213b14c64dc3d99e64c089405b1f4303e055440fbf5d24fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56142497a79d3f10339cd875f9df30fb0
SHA1c66b91cdc2949f63c8d013b4b9f9108df6bd295d
SHA256833a69ffb4c3c072a418f4451020f1ec93b092361585a7ae64c7deb4b5722cf7
SHA512564ae4b2660f36fb7ec679a2573539f73df4b2d8cb0f5495b2ec882a7ac4ef4bc6d27b79e00371b4fcdb4b2426f7e3d6c33c4d522c3334febae1dede99f63491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf8781937b4ee18f9f34f57d2586f81f
SHA1f90a806a9fd5fa470d298586eeed2618530c7477
SHA256ff527362b41a1669010b0891ac9e22e4a597d551fe0c6a8d58676da3cd48cecb
SHA512ed146f88cd9b426770460a4d5bf0ca6745558219aeff7d06e1d23b60049d0f58275ce544755d94aeb52ba329884e2418afc38e536a6c47493bedd7b10f7ebc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562cbcc8a482612babeca81b7b23768e3
SHA1663c1a7052525bb26e34a5878449aec5abe2c955
SHA2561bdaba9a13e95da1512237ebaddc3c046aedb82c7379c0fa0b54b337459657f3
SHA5124bc5bbff24a66f81fe729d69be7b690987a199db197b01dac12fd429bebe856654463217a47f3f39a38db47807dbedf0b9d2493222803789c1432975d68becad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e3aad799f25c4036cf992f28fc05b3
SHA11a452dd44c385f3bf22c01dd57f23d7bbd91a88e
SHA256fc405b4dcee84f8c18218dc6bc0fafcd92e7507c3369037f60faeebb4dedad11
SHA51248f354c27101fdec63083e2bc82a02f7ddfd90e50250472ee8fd291956a068819655cae972c1630068cd32cf7e8da561b9b4619ddf18a712fd6c0e0d5e7ec1a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0679b1561bb11cffce174e982897e55
SHA1985ecf8186ee9d719127c4b535729a0b17994cfd
SHA256cec9a3975e3b383c82a12d5fcb49826ea41bb2bea49047362b2c8a36bbb1adb1
SHA5126b05a97f2aab8f36c365737022e9997a4b5796f70cfc62e7ff1f8fb393857a3684b61ded0226ea2e2f984f7b419e4d7f053347deed332fb9eaa88668756298f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56faff1e88ed307d2c30b746db7428ab6
SHA1cb2bf2afe3a2fe0fc5b287dabb0a22a86b34d000
SHA25648a5aed64e7ff3bc23c269e756c1db8758597f635233816556d98bf26703d1c3
SHA512755781e2cd0b238f873998a5113512f420ebf23ab17c0cf8bf0448f0f36062cb35fbf9b06d076d14ebae5c788b7851132c0e780a6c3e8e063adcf2ec38e80a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80fd9d6a133f0bc7b6d269ae498d1e3
SHA11b8039835040441472e139c61ee2b53fffa4b26e
SHA256eee79510a8e3a8e9bee7f382bbb86b86cb68184a3f16b06404fb396a72e89c8a
SHA512958d8d174b993232e8a0995e5ec94139eee9424eb0b3960bcedb2520454b526d4e27b603ef07c1b7841716ce9a19729456c7dc51448c64c2771c347acac76576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56999be1a4aa02d8feea68442cfedff92
SHA195746a5129e2a979811db33faaa3216caf5e0893
SHA256a72e598bf77ffaea4ca1e94a558919b3d1e1d5cc152f49e79b481e9fb4603745
SHA512d38578c4f1ff9e3f48e3ba4c089c601e39bc04cd6b5fe0c2a98ec9bf2706bc1431aa584c25c4a65ff106df2404c9f31a3640c02970b37d1c90dc2f386b9aabed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b5ac0c54e0eca4de34a30b5374bce8
SHA1df5f41a234802b843f39f34bb98417e4aac3032e
SHA25660d2d4e612182b3ef497c2bc5b794ad9951960ed77877e27d74e44020a50c4ed
SHA512c49c9cc7f5295e05efb803ec354ffcc57629bca9e7520392ef1cc1c3505ec0f6debb41fb4f6319604cdea53bf0a7010fff3627a6bec2a77f1441480bbdd20ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa57668890cf651add60e44c60050017
SHA12eeb6a96cc14b3f64296119d9d9fe9c421a1e3ed
SHA2563be8270ece43dad876e18b125f256da4b61db198555eb88dba8afa2118163f64
SHA512a3b4f3e257138a2037133c5d940b7b57070edcb7cecf667a5ec571734757004497bf0d2e7a8c279bf34ed9bf72912b55c38087e2ed42fbbfaa0c6efbac6a9bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c69f55176b277ed9c313c807392021ae
SHA1934c7e9090feaca295a45f79d067431316618d24
SHA256cde4f089c7d9fc35d42a169e5fd9a4f6b5c5b7f76425fd4caaa14103e1118bdc
SHA512aac6dc8be5dd1f8dd5f807272787495f1a9b2c10f6d2ee4a7ab416ee7e05ebc147fd195161ef74598424cea4c8acc8a3ad278e745b55a67f1f2dc9217f511038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d73e7194644f74a049d1d79d30228bc2
SHA160994f11c2e9625be0e6b1eea7c1eb662b88673c
SHA2560ceba7d7cfb7c93ceefe12b9ca1f7bea124b6de10eec4b43cd8c2c16612c13ef
SHA5122a04e7dc4c82733df83c7c02165a8a55a9ca51b4a62807dd29854383582e79d420a5916c730186b213e795557e6bec8c13aa87bbf3165eb3db2e5d10301d397c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b