Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
2af5b4f8420a00e1e5ef76fe64c62ea0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2af5b4f8420a00e1e5ef76fe64c62ea0_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2af5b4f8420a00e1e5ef76fe64c62ea0_JaffaCakes118.html
-
Size
91KB
-
MD5
2af5b4f8420a00e1e5ef76fe64c62ea0
-
SHA1
886c35449458a4ca2604ba521b263d65685c258c
-
SHA256
e5dbb68d0a0e65532067f6e3cdfa598247f90aa12bd4f4a5e5a2b475e243bd4b
-
SHA512
f8602718f788bb228008f4739ac81f37cd7ad5f7b404f2affa7d71f6c2bf20842cdb0a0a8dbe6e5162171570d9de002c5aea0459f21f754d21a0b13d8c89d939
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcTPQHAq5nLeakHcZts4K0p:szfFLyU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000084dd7c3f91b61690bbcd2e6092c699dd5f4fbf18476c3eb9e2f118b31703c70000000000e80000000020000200000005097e74497b27a58744c54fe5141073785625aa87e304bd7087a131417a0501a200000007642f6dc3e0b5cc9a3cd5e53cb97a81d49f3665034f83f48367f764edb9dd1f240000000d03852d1fc1eebc7d4b6a05bd5af2b65a5b3e00ad2239aa228bda63c46a5a9c0debc495f3df63ad79cc8cdbc0e1818d4063ece6505fb14a9101de92e811f8231 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F092941-3D15-11EF-8B50-EA829B7A1C2A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426596722" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f73d8e22d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1252 iexplore.exe 1252 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2540 1252 iexplore.exe 30 PID 1252 wrote to memory of 2540 1252 iexplore.exe 30 PID 1252 wrote to memory of 2540 1252 iexplore.exe 30 PID 1252 wrote to memory of 2540 1252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2af5b4f8420a00e1e5ef76fe64c62ea0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52774b3ceb8b365139776c6737e902362
SHA1bfb175d8d47acecc2e157eb35cd55c9c73b51dbc
SHA256cd94079740a16d6c9ac82de217eab9176a58c552e940997750a06930cb62051e
SHA5129541bc55be94251fe9a70f2539c3eae25627d01449b71344ce531436849800208c75aac4bc9e83e728f0724583a8c92f7e7914eaaa029fc76c6967653f179ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236cd35b06a4f43859d4be292e164587
SHA1683d91344b5357394bdc5b6e7cb875c2277bdc36
SHA2561475178cf67d19af0613042d71a3a20d83b6cca95374db9ccafddb46fe6cec73
SHA5121fff0c47291caf370878c89e9e8652af7ac3539fcf0fbc0e2bef434a11bd7ef51d9e0ae194a7ebb2e385ecd029dc4fb2974ad8389ba612062e91a05945793b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53afea67da2a44bf052e5660fd4efe967
SHA176f8afc8b1c0554c62c9d297a344ab5b81dcdf65
SHA256c1a1d70dc66a25b7055919a8e3f2146e82d6617f06c937f14b719f4ed1af94e6
SHA51206294e733bffcae698892732e34a0e57fc25e19636379e9498a1b50e11f2895eb21009507931ced90ffb5d97d90a6caf1a88876439c3685a3b6522c6ea2ba32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf365f74d2796aa253ca52c67e5622c
SHA1bed064205883bc00f6013ada7abcda6613d946a9
SHA2564691bcd018ec1d0cc381a40fd02c3c9c4f4bfadadca5f554ff64a7e8f1658a30
SHA51297ed76fec0f040e4b08ef25c0c6eb068bab42af4feabdbd6fd8d6afac679c4c4edcd90e38780af7079e6d3fd49bff669a2e577a6eb01a518d82daa3cf5d03a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d659eeeb02395ca378ec62eca49e3c9
SHA17b4ac0211f1da43dbc7e1d5c3c07f19d76510f3d
SHA2569b93ed7cdf7f63f7d77eba42ef8441968b622f020077370073afa147baeb1b01
SHA512c72dfa45b3bb12109fa2c53651fe401fe069ef9e645ffccc1b4608b09b083ae714a4ade2e9bdfa48eac819430e13fc34e8726e81fd47a4a8f39259fdb223d4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd76fd216d817807b71516892110757
SHA1f4fd6226cbcd7f1016b3aa0f6e1003dea0fc4bbb
SHA2560ea7431cbdf5e171dcd90f36aeb9bef5c740f5b62415df97796cdddb2a60eccb
SHA512735a07cb00270dfdc82fb5d2b24eb3c783a4289f0379a737524a78179a6bf01352ef5010275aecef912ff990902f64dbe05c63bf8416bbd22037f30799fa491b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5defa1902c8ad93db13d92b8622f505ef
SHA1ae08e11aacfc9c85674c0978c59385326d3cfdce
SHA256d1337a67ed7e57cc4c59b58a86bb3b20449e08b9eb8b8102bed86cc222eef224
SHA512dd949f50ac22ffb43cc217bab9ccff45a97ea12aaae98e1b397a7831f69b6cb2456b56c030c48f623289ec794c74bf82195aef384338d32d2f1390de67623af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc3a1e08586cfcd05d7eef58381e9be
SHA1f6c3f13ad1078c2f2968c69bee30dd946664d840
SHA256c221c31e466e4f5e9026689e573cdfb2a655ef53a7370f6a5b6fb0bbee4131ae
SHA512ce742f2df3dd8d6f615f4c87d02a7d0dd76832b80594535b3231ba5c561199b0568474d9859665e4800105a4bd16481da46200ac012d6fcfb056c5b5f1c575e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52481154943fdd07c61d0d6f700fb1cc9
SHA1a7add659f17f108c89da0d6d0a2fd1735b79a5fe
SHA25698588cdc0cb81b1883d1984f5bbb596d20afc16df5685f454098cff72333eb30
SHA512e40d867dbbebe6b70d2b6cc7edab180f21bb4ce706d9637e6dab3a26f7a6044435cdeea273f6f9b9a68e30ebef0d1256396e953fe689bcaf73dbd0d088d780c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a32b019fa5c0fa176a314f0a6ab33a
SHA18c9c34842defe71b04ef8e0c1ce7a9e223469e72
SHA2561dd7f93ccf4c6b2c684c84a881176020ec5fcdede68249e0fbbed71952920d05
SHA512a580455d2de8462c1c6015c91625287cff18dea25e7bafd1d455d635b5ad401037be33afa7b58e6ec43f801d3f1c153d749cbbce5b26b82581bc42a92dbb8418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c5dd056706879deea9180aa96f0b90
SHA1eb04913676a6f2420337ee99af3e38894a4cf6de
SHA256467358db0d2d0a2288e6687edef2c5a2d1732417574ca9cd110ee0ae882797e3
SHA512b420ddcc04580e2504f168df2e1ae5e496c5bef984a69fdc6ae4c48f0454743646d3d0ed54883b89e39494d9d1cd2c73e77dda7764a7094beca2f63a25f14c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d660eb8580f17005396740c2074f84bc
SHA1dfe8f3b5e707f3c1cd1404e9e809824c8b67291e
SHA256320bbbc7142a86e9d78aff20107cbdc81fe701c168e38126ed9efa2445b465f4
SHA51287c750767741ae60744adef27acccae68014c8d672e767078cebe284aa222a28d977c474b48d9b6892eebe27b4292d907d08e0f3b7ebc6e637da08427952161a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf82a34f4de5aa06234e4feb9e8cd7b7
SHA12b584dfcc0b62575714f647afcb92b90ec6a6361
SHA2567fa1d4f5f0e33bbb7de4270757e798933371b53b567e58b6d9d1287cd728d33d
SHA512bafee84f2291d09e593587fc18482c6a2fbeb2f49791fdc317b2ebede249d10f8d45e96ba01913873f41bb92f2eab9b0cd27c1b52f391cf1febd12d30604247e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e30bb744dd667eb111f4ddf89b4598ab
SHA16c6fc3408d1118bca2d1af6dbb7e8e51656aa1a9
SHA25608af091b6381f2201f401ec6172076c4cf780aa8276747332afe68354cbb3a9d
SHA512b37585531aa6c2918970cb2926c6fbfec3cf5049dc2bfe49ff5c09cd264080bc2c22cedfa242624e954e62929ca03e994a3b10117331994c4bf428b050da8097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca1c5ca4083c57f1014ac376ded1cfef
SHA168aaf5592b1cc1f01ba296580e20217f89884fcb
SHA256b8872bc8efcf27e3a4dea2193be8ef919514f40b53f08f70364c30989b971326
SHA5123707e482a96b020ba12582b28f4baed5aa1e115907fddb2b248cfc7b0f3d6cb8414039ae96f9133a94a9ef36f67726bef7c1f13fd07de3bf0e2db093893468f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244e152f5cacea393fcae6dd95631e81
SHA1b232dd6fe7c022bfaa3e92cf40d716b7887e605d
SHA2565f834bd58684d3e08c015aa29135499da38cebb81dd2acc3f3fb256ccc8dda32
SHA512fa06560812ec57fa06829db0c05e7b64fad3a0d5ab34d2380525ae82da8db67c4ad355bd8abcc2a782a14172f6e351d83ff537a0af51731762ad4f33758e5160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58773789d2f5daeb3d4dd64d71360b37c
SHA1e94b826a0cc4da4a810d60d638b153399d2e7c9d
SHA25699cd10adf9b6e71455e37bc424cdcbd0f03e0fef5c84cf87b051ff277f8e046e
SHA51260ca767c05279fef72d906a5a4a968fd6831b9973f15e0a2a04a9bed34683c38755bea8ded5745747aff6b647e3b00b1a5f9f8bf4eb97a43ed76890e92a7f14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d40b5d12e7a0514685043e0fe772d1
SHA164a7e2ca8262a5143ed3db2e92fb19aa83b4164b
SHA25699dc3d61b4e3dffa8c31185538eaea6147d7afe1be979a4c5ab5a50c8800d5fc
SHA512dd082739f387ce80ae3883d3dc5df06b08b896d71a10012df814e383887d4667030216ddc5c5d3916c59b356237614624ae32df95d795d4202d83743de2d62f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e400629c2e01fcced26f7e9ae846fe
SHA14830527a614ba2d2cfd0ef9f37fbbfaf4b6c3804
SHA256f60050c8687e0cd56c3e6e41c4f593c5ba4f2f48d8637c219ddf0dba61234783
SHA512e7dfda55474e1354cbbfa29ace3ffd03f7ea0c94fdc7034e16df081d4b70e338b4efea719b5a4f5b374c1234dda41968f9d05f84d44cd96b3b1d9cfaa4645868
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b