Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
2a8e04710c721665476d87c2cc56059c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a8e04710c721665476d87c2cc56059c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a8e04710c721665476d87c2cc56059c_JaffaCakes118.html
-
Size
9KB
-
MD5
2a8e04710c721665476d87c2cc56059c
-
SHA1
10523e3f07237bcad54e2daf0fb72a40676594eb
-
SHA256
4890c9e0c3ef1420d26923744f2229afa5e8292987ae19fedd5ad905a40027db
-
SHA512
b20bcaaff277a8ec2e807a59e00c8acc502266454192c4f101393e28f0784433864eec48093ad50911bea34b7885539ad5a94c959c811fcb35b3880d488a710c
-
SSDEEP
96:uzVs+ux7lWLLY1k9o84d12ef7CSTU5zf7TDBEMFTQEM85T7+TKIT6+TEjhTCoqTe:csz7lWAYS/VMHMDJhb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426581838" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d1f210459bf498b6dcd30877147523012e14668fd0f92d19e42f8bcd89ee962a000000000e80000000020000200000008f6e94aeeb9a2b3bf52f302a76713de1d7e7876018cf473391ae5e01921ef0bd20000000dcc51bd6ef890faa7614a52d06f7877ed210f7d1854360f654cc759050b64e3f40000000569df63267a89956ab1d8eeab5c6a9cc16d59aefe275b4c1a998e59326a2c975b085c3d2dae7e229d073aa5ab6263afecae9d3c86d133287865d140be97cb1d6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F75742D1-3CF2-11EF-880F-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201fe2ccffd0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1248 1848 iexplore.exe 30 PID 1848 wrote to memory of 1248 1848 iexplore.exe 30 PID 1848 wrote to memory of 1248 1848 iexplore.exe 30 PID 1848 wrote to memory of 1248 1848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a8e04710c721665476d87c2cc56059c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d6d9591671c1a184fb8d9d71a614d3
SHA172825259b7afc9bfa741a9cac1a7badebec5e85b
SHA2563bda0a2f7a21defa67d9b9d3f4daa6e0b1c9d8250688818c903967889bc38b17
SHA51240c64193b2b86db768ace5034423332467aa47f59e168c5610435c46ce2624f15bd0578a775ba2e997e78ed180a3e41a7e357d6fbb1f2b7d06e5b7e2fb1ff422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db56083df292d88ce438d12858f1143
SHA120e405f8cd826d4a74d2917589d3057ad4b7886f
SHA25651e3fdece0e654d813fb09ea905919bb80d8575b81fa69f1f511466b96641858
SHA512997b9f2458f790a05227b85a88609244f390eaf15792ddd87a0d9e1a5d374e70a7c713fa29c6fe410eaa1c35c9baed3f444487b678ab7e3a29bee29add6ebb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd49f385b98a52b92a8117fe90999f4
SHA1d2696d9eb9fba49fc5973f41dd8325988dfb2f15
SHA256add3a3ea60078305be4e1f566c271147ccfc19696da7ec1aadbff083a0ce723c
SHA512d882604c1ffa229aef5f51ab54164af0c57c51c7c48e3c5c4a7a065b79e611687f9d58fb983461214d93dc1101ae8a6b1d8773ae09ee59cb9dd84fa7735b1bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a0a7cc9ff65b71170d31b24252d38a
SHA1802970e9518b5c42d88cb99ee49c903b0da4757c
SHA256eb494753ce205be468b1f996d7b01854564b6badb00f847e96e6a9157093100c
SHA51270db25497d6839fdb3dc4dd2b2d6f6b9f0b1082e9bc23a1c53a19ab1692ded304d21a131882e1da9dc477bdd0910ef58af7dc3850ec1b08cff192b75cc9723e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9910d0c90ea351e030fa6199c26a31
SHA1be06db7a2c2f252cedbae0a46f45eff60590f558
SHA256d55af7992397de2d7022075a47d63a0665c945211a190a34f1ce87b6c1b49896
SHA512edf92951cae52947063decdd69c8aac5b32bb57a5cad56b9377fa90810034c232e9c40968b5337ce06a71fc27066f518a086f6999c6f64bfa14dd0dd4885e165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6f77504dccd86466fefc8433076f9a
SHA1fb05f4823ec4e139aaf144b4cf506d44f08d0b75
SHA256c5dff2c491ced582f3d0bdfb67e61e2326db8c0a3ccd208b007ac1821a87e80d
SHA512a1c85441f44c5fd320eb1c5f59f55493a63df795f75cd102b5605329bf08ee606d6e28d95cd9f694918d2b93e11cfde1f2beec6915f315b26010d7df7befdbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5d4fdaa50d39ef616722c91163b2da
SHA1e3bcd47974932cbe5fc4172aa1339919bb515668
SHA2561c090b5bd779edf238aa1282b9e71ab1558d9303831351b80ae2cf12a2dd0ab1
SHA51226f5b76b9c78509e26636d82534540284faf20cca0e6774d91e8a84c6a4554a116adc4bb6a0a73b31512b38b01a0b08301f400856c4bae1258bf7d25a18df094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840f1e226d5be19e8c601d6601d1704d
SHA1bb525c8f648c8b72c5e858999eeaf1aac2569090
SHA25648f3537b15aa8e0f33d9d2fef10712c34b94a3263167f46ce1341c798a96efa9
SHA51261e311cd3a2fc5cd99171e5db2c790f0774160eb84fd0646473f1a73323d87fc4386e097b2b853913c9d3e781e25932e906c4c546cc3bfb1c3f29bac3a43a4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c321068e3fbef6803aa6f92c75791e56
SHA10486aa12b980a55b807866e13c723bc09615e66c
SHA2560554a5749f9c134124c92d9939a4c0bbba176048e54f706a7cf1c11daac552df
SHA5125b65daf5bcd460f060f7151ec0e511049558cb2296587696ea832020fcd9cf4979ee0fd5d20602b4ea4e726d556a159cc6b0cbe63ad906cbc705ed3150c9e632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d609b5fcfd02044b64dfa11b89261ee
SHA111b881ea67d19e60fa664b2cc2dedfc3d782c1a2
SHA256d285d996e7f265e1c92c14900de8c54759c05fabefc082d9d81630a91287f5eb
SHA5120d90edc3703e3c2a0e01a2bb9e1bb7c9c324ceb71d9194925c4c811ab5d19e510696af6ff63a4bda708849ee18d544c1c7d4f66644b66a5135f4fe79b2b887ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db6481cacee61b031c0fabaeb5b65978
SHA18ed0de6cea7466a065867f1af9b44387d2eb9a86
SHA25669a5f2ac3f22b1c4297e3c42c32296bdc2113301215dea4480609a4a73fd23ad
SHA512d5ba14232fe4b89b621f34ce25ac1724a7ae835b7e5c1b1fac0287f0d948767c2be331cb9d20c68eb86c0ce1d41eda3d21da0a75785a5606666c0146f645562c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d19e62699a05392dab2ac6037ae160
SHA1bea74f3052517edd4491e6a23eb2b8d02cb95633
SHA2569c73d56caa493645f9479ed6d8bd9d297fd24b2538447e530551c35256b2b51a
SHA512a7e08eb3331905d60fe0206bf5c72d0d611537d00a7888d148dcddeede62cf2f06f25a4ad00c831835b7663dcff6e18ffd6871550865e149d0d137b3b13145f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec1d11fd3f638094de065a84b6dea89
SHA1ff062a6bf2268a8462632751a918fe7f3890557c
SHA2564cb1003565661271c291f2d7dbc197fefc4acf46a3a2ba0096edfc0183fc536c
SHA5120799703720838b99026c9d1c61b84fcfa2878877c2293536fea6e13b9c5c244f8bdc4c11b86361357ba971ce92f3100bb861a182d1cf968860b57f96f4402d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4639d84ee09c2b4e2576084bd04c031
SHA1738fbc0a7b65b8e01ce777d1761c6a99064744ce
SHA256a24a54a1a49067733432225cb5bfefb99370e4b3c79ac8b94aa9476c308c7795
SHA512b1d14204101150930339d3ab76fcd4a59929be97c3214f27c4250aa795870c86e9d92462e1ae9213e5c38e496d3823ef68312ace2f7a6e6f2fcb10c8c66f1da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e488fd0e2a8c98cbc5b51d092acd13
SHA1858ddc713aae2355d55844a61ba5ff310bba3923
SHA25624b61ed5417d3ee3d8eb43a350a4e85b0e6dbad4de4dde862037fa3cad8c553b
SHA512572dcb9108da61d2c5e81b263c0582dc6eb8f04e1e4ce6b181457060d8fab270c05e6059eadefb7071e8450f74621739c6a47ff8a08bb38586099f0bcf01ffe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd8e01bd2db75ff22c2319851a1ed561
SHA16e66d2ae63dc46cc0d122096363c7499f99a2b03
SHA2562d86eade7dd84469c9462f82eb420797e66a8c33f903256324470c03678740e8
SHA512d4fb64c9ffb350a4627fa2b2ec84da84d329d7a9516dc27da7639de2db184ded2586e2c72354b2e62fcd997195b7628e4123074e518b3fa6598ec129bbfcd797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4691dc012ed20cb3d0b073f7efd227
SHA1b2520f476af1655764c0fc302e8529967024d269
SHA25691f99e355d104e200e80f0fdb54c08465985e5ad84922433d1e5b11ed7704e4d
SHA512cc00271619a64eac9aab4d1fc3e5dc885a613f5b2aee41821252707bfbaeca10c74fa3038867cdaa23f1760644a568736d5c5e61a9ce7aaa6ca1d26d099966fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590cb30b345bc3973bb132d31b96d3170
SHA11f25fadec5d16774cf64d9834526f962989c1a99
SHA256f3173131a1b0a078ad98888d83dea2fd86cf3d03aaa5703fb29eb61af1ba4c3b
SHA512a14ec69919cec8f2d69a1b30af3a9417b4cc906e059eef6d67c32627faa4928a50cfc515db8c246df61438f1d284dca3e8f2878c56722cdef8b4aa6da557d5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59330df4ff31f36d56844738feca5c4d7
SHA183b7dc7e72f01d791ddf134372229e878cbe41bf
SHA2561df5297bf987393fb2b1e25148f80ac34e0cfe2b2517d6d6fb126e375dfee808
SHA512cd28672a570beade05a6b590ef6e7e63ace39d52039aebec9e33fcde24aacd7f49b0ac6c4c25799e851d6ce5f9c369ad1b5f1cd1977d23dc323ef8733093f3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7bbd93c7992cef2a64c682ee0e86d8
SHA1faa463b5358863ec17d7ddd35aaccbf967e06544
SHA256135f52b2ed1c84fdb5390650877aaecfd22d237f779cbfa504d2f1279f10ae0d
SHA5126e45b5ce22f70ac7bc00e3fe5d2620df1a925afe88e9039cb7a7602c2af0a2b9ba70e932a73107a81116990c3f5398b7c673e8f5f9f7feb9ce8f8b519ddf338b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b