Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
2a8ee06a71940cbd040de6b8b97ca2b3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2a8ee06a71940cbd040de6b8b97ca2b3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a8ee06a71940cbd040de6b8b97ca2b3_JaffaCakes118.html
-
Size
7KB
-
MD5
2a8ee06a71940cbd040de6b8b97ca2b3
-
SHA1
1275ed545d2755a9c5e5334afb090da24a5b0992
-
SHA256
bd1afa9ed43c5b7b2f9d83c23c7bce64a690a4392e554abbc8e12a4c1a8e04df
-
SHA512
154f72df7bd43e62bbc9b8c1803a73e947c53096693d8aedeb3e81440424c3de93f4795c871ee54ac15a83d61af7267bb8ae0cd21c419ae649601b81607efb51
-
SSDEEP
96:OfiozQqigopEq3KWRlMuMEd+cVNAmbISmnXm2+jeoA8Enbzt/aSmv0kd:Of4T5aLmuuMEdjVNPb6o64Enbztdm
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426582062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4079aa5200d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D09D2D1-3CF3-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ef76602af8b1dc459c2ac305ac9cb3ec0000000002000000000010660000000100002000000042c6927a6ea433292265969e0702bb99b50642da82baece5f05ef85a29ba302e000000000e8000000002000020000000f58c66a68ee4caeb5cd41bd43fd277c06fb1d845e5e8e5f0400b9e788be129ff200000004fd2956415b0a4f1bc191d2f4d8d3a5e4d4d0e8ee9201fbf1d52f87f711c32d4400000000d64ebac43e2d0f88b3bdbfc33d3934c48391f9e78a1586bc5b0fe966883f1f1fcbdd0e8da900d409c0d0adbc4067adf9d49975e72b67e31cb27a975bec639c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 352 2268 iexplore.exe 28 PID 2268 wrote to memory of 352 2268 iexplore.exe 28 PID 2268 wrote to memory of 352 2268 iexplore.exe 28 PID 2268 wrote to memory of 352 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a8ee06a71940cbd040de6b8b97ca2b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645f410497f0798600fc9a7642dc0286
SHA17b087b89918baa443db246d1080d8e86e94bb34d
SHA256010777d2608b1ef4be87dde7c41de135c00d07de5ae0b2887229dbd52191ac67
SHA512687699b1795090b25d23de50e15ed21508c21f9189fce0ba8e62b2c9df909092368d3f5eff219cc987444e67654782a582fae685a787d702bbfa5bcdf6f79d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570325286c1b522d73a5ffbfe1385e175
SHA188cb661274d56c72713b5d8e4da8de4085470f91
SHA2565250bd18b03f2d5b00616e85844b0ea677b1500674792d085c2f81a43d73b27b
SHA512826ee3b2eeac6326088702c58bca83da5b7f7764af280f435bfa72d6acfef78aad4aab892e8e2d68232c4081ba237fdf26d07282ffd10ee7af1507b0d222e4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ea81a47f5702c261a3a112aa3ec37a
SHA11394f22c1345739015f5a13998083c1e2c18aa7e
SHA25688738904706b8309f714bdf716741d361870337416aff62a04b4fcfc326ae58b
SHA512b13a84eb8c6ac94aba3c6987b84400b3ab66fbdfaa4bcbd493224b68b1c43ace84a1f3dddade14f08112cd58cf9fea25b64839818a5b3ea6a6b948613069fafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc3e6688c7729e801424c0f8f5d9fcc
SHA18820c8e546f82a6ca42714f9ad8b4ed69f914e0a
SHA2563c6d45c4cb32168608b121a4881816e50e768f22c60cadf8367510430fc4f76e
SHA512e72cd58adef58f0c2e18ec2fc70f5057f94ebcb48d6cd3ed29599da92932a1dcc90006841abd4eaa0eab7f068ffa1bd73102d6dfc9821da277a7dc0d5b92de83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb28bec7feba7f15059c12c1475a56e
SHA161fd775cc81ba424d084db93ad8f029c12749162
SHA2564e51341ba889f342b0ab9007d0a0059ceb5e09ba6846e2b04ca6551a591474e8
SHA512049063b977877b9667731d6bcf51f129e3eb5591cb047f3017fef3ef74b7b240978fee808ff3ebf915d4e7dad9fd25b056c2a170ad626ef837e36bb2f856aa0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38bd0584071ea7bfa042bdeb0b72151
SHA1f804cffb4494dcdcd79705a57f429dff30e5fe43
SHA256e467df26b76882d84691f792f754c783aa485eb749f4ba3331aa9089845d3758
SHA512d208fdc2a2176a6e7f67d92d647daedbccf00b1bc68c762aca789981deda32b23366472803b0773e34568009c6d3f8f3f7710c7d0e98a0e93b5fba03a1dcc414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526cafaa44db4fa3c175c9b9e0c16d04e
SHA13028685ec443d3c91e55e8f55cc52653ba780bc2
SHA2564220126ed7855f5ac4cb036d7594e092191324b25ae3309709fe90fc94324ea0
SHA51275a0699860ba6e8144331d6dc9d7eb920192308bee0b5fbf407377dbf689f9e5ddef85b92ae52d2cf60e85aaaf3db82786d125d080e94ab65ed206ada8b7766e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ede1375882317c1922a4385deb7ec6c
SHA120a652aa6e1c00c98c47afac2b8e4a30c23d4c70
SHA25667e5e66d33c4050cd60fe6d9e158120c85751fec71df6e9033170b48ef8bfd61
SHA512fe21d3b274163bcb39af951faf650b754400ab47737e1dcaa02290baf9e78eeaa6987592e5fae4085d566727ff8810be297d7f1cb379b1490d54a2bc46476681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57180cde44e02f37c94c1f10227810eb9
SHA1a9db36434371cd3008a5f5f87dd97685b26eb4cb
SHA2568c8ca86b71d7025eb9277eb700661d7b5b23a2b12ca92e7bd8816a92f006bed4
SHA512cbc7687dd8f45101e3a190b84f22a582fc426891a9b844be60b8d37da3177e9dd97320043e9fd571fb550c2ab45f670c43b48f252002a7e5e3423209a8fdc77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59427d92c44bc96389da7c0211538abd3
SHA1a4d14cf376796b1358fbbe6d51548598a56012f6
SHA25625704b7976c6de400ac93fd0d05c1516c7952add34647dcfe516c41919d01112
SHA51219f6844cb057131203b76c82d1a980e6414ccd29bf7a339d5c66996c285486ad39ac9f405df7238179bff08ecb4844dc38bb1434fe09960d900774474e8010fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53327aa366cc197ed847df14456427f5e
SHA1561291bcccfc5fa054089fefb3bc951bb449e53f
SHA256ea4cb5ae03dae96f5fcdbeea40de3ea327be7fdf9d970a622f0a3d8d05c824a0
SHA5124a778e3a3046528693b218eb509a18fc9c5be42ed4cef37f8ab9c91f473a220782cd8ffe62cc8b8dbc92023aa76991c51ae20a48f58bf32cc51e95d2d757bb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0bc6a216dccad20270457c26c7cd5a4
SHA1a5cd9fcb80822f6821f834c9fc2c57bd4a6af720
SHA2561e88b84f4c97e14b09168580e2b980d249e826786cc185e1e0feb5ec26706054
SHA512c5d01b6df53a217d635967e80e903608e54b062c53f6cbd34bd4bd8b956b7c183a7ef2fd634350c58a52a0678ca9b274ac965c0a40122149c9c13572570beb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029a55586ce0b26bc8a7c3704b9b4273
SHA130eedb6047e49e58a17488b72b2c18fac3b19f5d
SHA2568943a7ad9c2efe5ef4c91a84d1d49d40af73e4104105b717501b100e4ee00f0b
SHA51278d2e23a3c7f1ee9fc753115f95af65b0b93dc75dc5fb6a9391f9df2d5747217a672a24615b9f3720f759972a3d40b8221ede10f656657fbe876d9e569bc3527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122ce830fcb1438d8c33536b139c3c2f
SHA1482edb5cd717d8494d0cfbfb3eaeec2db1885e45
SHA2562979f4b61035a92f3eef5b61b738d64af67fafb5271e423939b493998c4cdc9b
SHA5120594c6204b1a43409ccd2dab831ab53c54d9ab861bffe682119f631e8b2336dcd4740fa35adb7c84aacc328c2d9ffb8f4617e290486faf9c24d27d2303af6409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe9deaad8fd1a117076083fe9cccafe
SHA1b71c3ad142b220fa0b597bd30cdd30380672989f
SHA2564d5ea4e12dae9f1976db624a2a656aa32c4b77a2ae54f5c0f0ee4e0d8aa5b7b9
SHA5127a23fc06836615eab72caca7227e5109f0b2d425e0be7dbdbf24dafcdc3213362e3f86bdffa9c423294b4e19c47b07e73f4372ca1c05bf7d19fc9e0fee4047d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8df7bf94608fd73b9ee71fbd83d5db0
SHA1d4e139cf687b7aa938591e7066170ac9e510ad70
SHA25622daf4bf215df3e1bd71c47a8ea94c54b2662495d1e6653696b71827712d997d
SHA512b5d6deacef15016f251b24de446bf04fc8dc9a5a65a7d1aae07ee7a19c294163c17d90bb65ac5488a9a7974f33b0456202562973db75bddd712f417df1a4505b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07dde8c2433b97cb41eedba5c0e6282
SHA13bdfbeeb56a9d6e1c88e05412d715d1fccf47dcb
SHA256488104e1b40a406191604bdf9573c89e9d326f1b3148b1981f7247df3ccb2cd4
SHA5125fdf932ab6d0cb261f9b52457e104fecf32327793391d14c9a2b6b563bb6d8e9bf885ea671f0ad47065e00aa7928ba449fc10c2582dfbc9db4617d47cbbf2da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdfcf75dfefba2a8f0c728e1e2e6ef5c
SHA1439dc9f3a2dccfb0df282f779b96e633cb20610a
SHA256a33b716d4d2735aae76ed403b72c64c1317be5ea53ec4a7f5689e4a31b658e37
SHA51262da006dd0fe3c38e05e383657f2cd4a1ada4df1c5f12dd100f82a2e6f18ee987fc00367b5c93fe6afded5ffa5834fe9b25e05b8d01a115b5a6dafe72a491420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f82383e378add99eb330e540651ef4b
SHA199cd579401a427f7c247f74d2742a0aed78744b6
SHA256003fbeff40ea47251d0a0ace0872c85462c4f0748374432491795d1440e9e62a
SHA51276e4d17c810727dd07aaf0a9674594057a2d72529b81f714542aef93090e7b5b3d4b5090b50ea11a1b549587b93c29c2a6382748de7cb4dc28e7acb9af74cb15
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b