Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
2aa662d52e690c6c86f9b49a5f1da895_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2aa662d52e690c6c86f9b49a5f1da895_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2aa662d52e690c6c86f9b49a5f1da895_JaffaCakes118.html
-
Size
32KB
-
MD5
2aa662d52e690c6c86f9b49a5f1da895
-
SHA1
bf259b465002aaf3b51d8e00afcfda8b01299367
-
SHA256
99f57846cd919c6b7e746f709148a610d4ca25ef2b447231de21e2e2e8773c96
-
SHA512
00b48c70a8b309c81803fff8c39f2ee57c4f932f22325d96d45e80565f610701adacd21b395b962f8d2a2cc2f6f2b3893c339985ed044f962ff5d7ac05f830be
-
SSDEEP
768:Zcd9QZBC7mOdMc1pC5I9nC4ub1wtwswKMISPd:gQZBCCOdF0IxCnb1wtwswlISPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426585273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7092161-3CFA-11EF-914F-526E148F5AD5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000009a517e1c26efec7feb69bfccc2c3581de3efc853d6b6df4c1c60ba1b3cc7f09a000000000e800000000200002000000028df3a363ec31823d1cc9ab9d3ccded05eb9516f541eb99b13630827ca92d9ac20000000afbc396865601d4225712722082a6f0c403c8b52449f208fd4df162db1ca2edb40000000ac965253581d12111d545bb11f71e1fac6a29b8ff7058115eea4a3255a3811fd2e11e6864b2b2f0263ea55a7514be725cb83746d0c439be7004548db4735ad13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c6a8cc07d1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2060 2704 iexplore.exe 30 PID 2704 wrote to memory of 2060 2704 iexplore.exe 30 PID 2704 wrote to memory of 2060 2704 iexplore.exe 30 PID 2704 wrote to memory of 2060 2704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2aa662d52e690c6c86f9b49a5f1da895_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439f2d21271fea4053ec82c3413035c0
SHA1a0d2a8ceacc08f4741e323d6e4602d59098f6a5c
SHA25639d0d64f29b4cdb331500b2d4d692c0ae3cb4e4b29235c102ad2b0e4842c98b6
SHA5124638c1dd08471b32daac9a51c294a252577c01ab53a812c145e817271a2e3a64b7ead3989f311befc7a7215199e8bf22eb1f8a5d8a4a5089fe4c4919a69f96eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eeec79434c45284299c6acef15aab9c
SHA196bcc849cabc20e1f5c900cbaca8fc43c8b51c2d
SHA25629e19e5cc5147dfb6cb174f4a511d34da074da42e0734321b0f6c24011166d0a
SHA512e5453af0eb203ac5e2a072011b0154bd25be4c238939e8faf9326025b6bb81e76edabe8e2c295e05348c580cd3b57cb67a77fa41fa333f63283a412793750764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77674d622efbfed523d03891728552a
SHA14a535d64044846eec7c365fbb7e77f1001e31821
SHA25632c0ecebd5c4ba9f2109f1bbc8e6fd704019d35b8837ad84345e39b8b4d4e73e
SHA51255eca0f725f25bb87c920443424686f22d7eadbf789ae3c338587df5b350bc069fb5efc81f6dd95c33cf9e2e9de084151a0b01afe4e69ab8eff0e4ea89480143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a246aec7137bbd157554cff5692ffa68
SHA12292a098f45efa6bb367f516daf4f5cb4ee5516a
SHA256480f4724704d91fddaf71ff93114cb82d0b1627a74b7dc555f3f54d8bbf4603a
SHA512534c33a65a61b80ab6952d705c993b0811e6af4d67b7980033a113dd926ae9e4d220b7719cf8ac647b2ef003c705bf2e1e6b299aef5d9b7b6bc6e1b946a37b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e434dfa4aa19f0be878a5ce03469dabe
SHA187d6fc120faea31b1b5da02566d363753b508a49
SHA256d8a861d6436726a29100a2bc20ab40da32f0706ff0d0f737b0562410a2191ba3
SHA512aa2e2d3b9c5aaa3e84deddc58118a9ba4f7897ef34bc1f031f20d4d2640cdbd663ea423147ea009613293e8ea29c5ecf1072f9fa4b591fff481b200d999b5a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e290130207a986e1cb2f622d5dba5d
SHA114f805ab2c554480c30bad16410edc284f7d6c55
SHA256129ce461b6c16cad2528c65f70a95269b8f7cb86712048453ed371a23fee6e6d
SHA512a01956f55dbee26dc06b99e2018be97f87dbfd8828a7a157da804af9b6d6c8a57246099c61a1171a3baea923c3cfd12e6bf806dd704f853cac0b2cd4775601d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db5a79694f0f25d000c4e8b91ab5a61
SHA14a56817728c195bba302d14135f923bac970bddb
SHA256b2bcce10112807366956e8123679f64b6deb1ab35b895d2f4563ef9cb8fba188
SHA51287adacd3603148a2cbcc7ae0b4d91b759ab2fe1706b3307e4f1a54eb82a0da88f08892aeca6b21e66b52d454950cee01fe516c897aa069dbcadb86280332bdbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591843223302fe37c99a1db161b286deb
SHA1bbeea33c1b0312d0ee82ea1107f187562dfebafc
SHA2566b67d63bee9d002eb729e3fbe03149290d5672df7b394a2c345d69eea4705461
SHA51243a102c6a39c8ae19e7371a1accdf2e935d3305873198032f4eaf59c1696ae75f6eb0eb80ed52369f5527923347134609fd2247d74846d31a1736e21d89c2e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a52bd91148e9d171d828b9fa2da749c
SHA1a4866d687e5429db001fe0f035164d7ad2db4d94
SHA256626e5c1a26098dde5f11dbc432e5332a2ca520b6f897e832e21735445f0bb694
SHA51247dcce8e0cb0d219b9aee41af822ab4e56292c424087d626f5bc1a2a6cf5ee0bef8eab9b7cd88883c487e9b32ca6b204d21571ec2d12dfdccb22f71d1e482179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ffb2d92dab0a5b0cd806910e1bcb027
SHA148a683ba888394506310969ff02775c0a489b190
SHA256597d2f7c05a4228ad312b6044dbc8ab86dbe379f77817670ce51679134a4a19a
SHA512c0dce7b13b3b734b9db9841802f19526364ba59dedfdf3a9a9413b571579df9a1bab2d476b2c28f4ca9e491e73680b15262bdc123af901010c0c2c8c2f46c576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9c09d353492fcb109f66af984861ce
SHA18da8dc9496d8d7ee0a68bb3d4a5f8cb7db224dfc
SHA2565ae8e99acfc81d100eb9641d6093edd3cc18e48aba43646d5badb8daad83c094
SHA5129905acc77f504c4246b4a29817d34049892214796c7cb771058cb3623651bcd0def36cbb2d1109b55be0fc73cd41a5a862fb555b96c708af3dfe949c548facec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453e50e0a8c1217be920b036086e5660
SHA1e698ee37874d28a0bd2fc2441c11a43d6e5b636e
SHA25682b738d5013ee3b918cd58c79b12a918ca07b967f771775e51ad6bc50b1d4da3
SHA512659b03b77c3f5bec0d715fb6cae19c796161b5dfd7c7ac33d7464e753af02225807ee0787781de16dd30684481d014a57c05e442ac2e6719e5355a0b49b87cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d361dfeca9d25039b6b0c683b9ecc4
SHA1fa0c13f246297a5a26360a279d105548b8229e45
SHA25615c1f6f789d94448bef2ffe40d92be11b68dfad5d1b0b1837d7e01c6b7ad035b
SHA512aad1d2e2201a2a90dfe050f4d379fb71c5040e16b6e59dc664323d92ee2218461f049c6e13c9baf38a7c3aa42e6dad6b17755f26fba6475416d1fc12b438b512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e4a025b471b63c6da8517ec6ae8ae6
SHA1768712d1f4aea58ff42b2294e2e336b070ef6f44
SHA25628acf315048703ad7d188952cd3b8fcd8fd95938542082798d105f93ad334c35
SHA512d37edf0dccf6b46b8504a3143073ac9ae2e006cdac28702c82ee9feb19a127173c8747d6915204c35c0e1f6343eaf96cb8c2a5ab59a90610507cf4946cd57900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb9081207d5e123df1e5083d154bd60
SHA128391fa24bb47bfed0f330bc2aa719ce54f41b30
SHA25694fe9d16b3b0867117c016e4f8f2c2d8c668d159fe13a1390d52f3eaf8fcd02a
SHA512e18a117a25f13f7859d32cd248f07adca4eecacfadb57cc71ecdf30e481600e2d22b076f5833a0c6a8ff1a249b5b356f043a3a556cc02b81045ff1704eec6c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189773ffdbebf47de302a8fb2bc1b235
SHA159ea8ea91f1e92c2aa380f010917deddab4e0b72
SHA2560c6999d1ae8e73f8a13e7f2cd53063598665488d90ad0b612571168599baa2e8
SHA51250fa7557b96cc834664e3240525087c04d8b70e438a44baf8ca23180df4913b22ccb6f442980fd383bf52a641825fe4ffb943a6a958025d1517a118e85935eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546a9fda4de41334e370a801ff6cbc3c
SHA16a2d60aa59c6f983fd35ac6b76ea7d0b05011989
SHA256c6f2418260f22cf2c829dc0ba64d3690b0cfa966766c87c3978a254656e20e39
SHA5122353831f51ac473db6cba69b92310c9c2a2b2417d539d3457cd71c4eb743303d2eef873056394bdb7c4cb69eee30d7d8a3a2e8c11b0c2e9750f7489aca359465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9905afc29ced19bb56981fe2c0c4a1
SHA10f76df0b0a939adb3738259ebfa23061962d388a
SHA2562630d31fec512a36d577f10fda746a87496f085c23c86bbfddf38663487c9c0a
SHA51254c9f48a07e0b9f9ee528feac1f30b4df9de46f90c46351ceda29b99a9e1f04142444e4f9e4569829528f8ded119b8afb08cc62e17f23dce233eab55da5a840a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b