Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
2b652844487389eac2c4e41329615c91_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b652844487389eac2c4e41329615c91_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2b652844487389eac2c4e41329615c91_JaffaCakes118.html
-
Size
57KB
-
MD5
2b652844487389eac2c4e41329615c91
-
SHA1
13ff9eadcc81e3010688d740c150ee4946277807
-
SHA256
5a0af1a3999492572a0cc844f1f1575bc739fe708596b7cfccac9e4f0099dbc2
-
SHA512
7f9fadf543840f08457a5560cb2f10ef992fb657f74310eb0eedc77a8cc2c0b3c553c14d39078e7582776418be8d1f49e69f6eec5c92f18e60115d275b25ff32
-
SSDEEP
1536:ijEQvK8OPHdFA1o2vgyHJv0owbd6zKD6CDK2RVrodiwpDK2RVy:ijnOPHdFN2vgyHJutDK2RVrodiwpDK2m
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{556D4211-3D26-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c71e2d33d1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426603902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000326cd4281da18dc74488edb89c0bdb1d661b9e114b3cf5830f000836836437d8000000000e80000000020000200000002aa60e2b9020fb8210b19e951cc38d6c91fa3f8d9cf1960f8b9916f8d7d7f0fc20000000a62ea7c3ceaa0012974dc40c8447c21f8d8ba625c094921e87a15c97694e84ff400000000a09eb16496a04724b97f736d243905394261f6840c1e3032a6aefb53038aa8ab46a80996c744be9884d9a8acbe6c43f4fa228bde14884ba91a987012ad85dab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2812 iexplore.exe 2812 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2780 2812 iexplore.exe 30 PID 2812 wrote to memory of 2780 2812 iexplore.exe 30 PID 2812 wrote to memory of 2780 2812 iexplore.exe 30 PID 2812 wrote to memory of 2780 2812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b652844487389eac2c4e41329615c91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b319603b48878b6ee25c987d9a70e0
SHA1a13230fea39e30a84a30c479a326ed6fea97c285
SHA25673d47aa03055ce110722dc2eef8dcae8fe03e47a1e4966c4c4d9d137fe47e96b
SHA512bcf8202b2cf68f83788ae9702dd54969497d02e5db96806c0a49c1c19a621bbc04bf25b7b17dcc48ea7df65bab8eeacb73276e2bbca4935fcdf98b06a5702c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eed4ce689f583ffb04d621bf276191c
SHA10126b14f26bb81e70b2563f437e7d1fe5049094c
SHA256fcd7330736b969b04f47490a23a878ad5206f7d82efb45f855c45ca9c1851459
SHA512ec1e116dc921ee0554f4616ad0d97e639d5999ba6d465fd95820a452d17525215d6e926662f207ddf9f22ec12c80d47345aac94cf53258e20bb0a685cf16c4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d89e9a58761f4ceb042fbf594cf5204
SHA1c759214cb8de282fab0e67e7abf07df0f69a3a80
SHA2566cfabd00fe30f625912ca2ab40027d3b886910fcd6966026ebe333aecd0ff7c9
SHA51203e9acf70854e53471fe65dc8b49263af068906cdc5a28d294d3e5973e446f4cfbafb866bbc2a8634e17b70c16b1195e175dbef2782c67a590ad7d82859337d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a5b75d7ca6440ccadfa8d76ea897e4
SHA1ac53228be46e29aa8d29a38a2b9f320f4a7f93cb
SHA25602d2fa2ce5edcff9efa4b342271b485e8c4a5c74a287d644311d985b8cbe8cbe
SHA51232ac1df3c58de77d6d359a241b126383c342c2bc045434d4d1cab3183f4b389563a2b0c0a0c2dddd2a64be5d6717545db1edb328e8ab57ccad06924c1c226b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e765c152ce3ca8dab2278ecd61146ef3
SHA1404a898423cd08da8e92b5bdab5d95c351667416
SHA256e95da908db8bb955c8dfe6a413c878a3f866e1e5509d888f1d74eda227807e45
SHA512e072130865c05fc037ab857bd3be2047befa83007ae6621a15c02524386fd3ee3ac5f139b6bef3fbde99daab64a256f82a9cae9f6d99728924ef403612f0b845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e841d7445af628a8224c2943124d4c3
SHA17be4171f96de2bde063fe4f5997e2eed38145ec4
SHA256a22e8bdc6fc6acd26bb33a7511cdcd0b6813ccdee5c9986b913e197d579c957c
SHA512a1c4604ca62107afd12c3e5d7cbc42a0873d7598f11c73a815710303906caa2114206169013bb53a9d257f2164732dad688258a0c656cd8e6f043bc915274879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647f6dfbd11ed706ff96369e012261de
SHA1481fc73db2b3dc11ce0906f7053c2052e5496f50
SHA256f550b128a0156247a1cc28780655c3a6ec49d9154b8a9da75db536c645af4485
SHA512fdae48f63ce1dc0989ff9b7fabd08e0c469851e5ac203af3404b11963ce4883218ba8c772aa54432165564adbe93118e530ed002e1da7a59c96cf5977b8f9ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a887cb85cc7194a2ebe15640e5689d
SHA175eb31a5eaad7dda6b3ea94635a80b9c52f68345
SHA2561c6fdca63e47c2485c1cc80a228e0a267452a30199e3000a638f6ed1f1321a42
SHA5126de1618d4f341d0c282db5aa2ac53bcefe09ac0c59c3ca2f0e7f3d2b3ba936fa51814260bf197b7e1766f0d678d28785cb589873a2c4e0b31d46a51eed6982c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563433cce5dcb6d590e27e1686ea1a847
SHA15e282606af676b079065b34266d3f08d103dbebe
SHA25699cbebe24185f63b62265eca78e1b2b7cb698ba8cb978c33a9bf1d2faaf75152
SHA5125eef93408af4daa03767e11a8ec19daac2bc3cbe36fa10950e2566b3658feb961688a0dc01b29ee28f771d8a3732a5e5154b0ca77249f43d07c5f29653c56969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0000f92504ba3126f2e2ad19964d19c
SHA12dd77a2de35b3e20bd342db7b6184c82259ae94f
SHA2567bcee031111d0e537a9c6073b6ce3e76042927e7b5da7cfe0061bae42601c6ec
SHA512ba573ba0f56a07637ed9ee7a048051b81eb744ade7a1e48646101c2f57ed852b7f1e403bce04dd2a4678203d1530b0988c2436738a561cce4616de7424ec592b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793448fac7ca56a1b144c09f237df05a
SHA1057da94d5ab017f5bdd29681bcd639e36a3d60d3
SHA256595a0a5be5c1dbaab8a06aaf3b98e9b4a89b9a72bae2ec61e9e5325cf3dd1e2e
SHA512f0a99c56b1f65eebc38fee6433f435499e523986a8aec883769ea540a7f0326509b33e3a3e4eccd1e9f3cf4a1016c80234ca0b505a9b85ad896f5eb2a34ca9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced0a00632334f14b90dc088d5cfbb6d
SHA1e73f6ce28ffdc291b10634a4f86d0401ca69936f
SHA256bd437c4d685b1fc3183ea762c6bc012b0a138e716223b508d9fc33e9ea63e3dd
SHA5128c8cca65d46ab606f2e20ec04d640c49bd303a04434a28958a1b6a7e74e517eec5780c79f95bd77bdeac8f6408705ccc64637c52df7eb3201dcd2043c6aba832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2273e865376b6750359c14ce573225
SHA1927f2ad04e2e91e1bee5e4104907f3fc249b658f
SHA256ca373423e9c60ca05c35d9f60906036c63588e38d198aa78bbf0db810fb444f9
SHA51270bfc91b3f43b548c3f8e3d0e8af995211c746018b133a9e051330ac3a034c252fe447f4fe6ccf583ae205ff043dabd7f41a9485d7bfd51c92ba9ba1a2f737be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3dad5a04ab9847fe26667ca23b11d7
SHA19f77f7d752bca500c8fc03b200ae713d58cf11b5
SHA2561e9188dfc8abce15e6edb7fc320b0dd9f7b0fe0e1ea1b0223a07751b24dc908e
SHA512108252a54854748c33dc90b71c1c4e649f0a463029a0f4581610367e6e646306eb39ca8e02f0165e4b041f85a3604cd0d07b298e897b96d7aa02220259286f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93b818fba616e23872f2ba8992c48d5
SHA1db401a29eb8ed04c0b7e77ec8d4dfa54cb2a2e67
SHA2565e5120fcee5168ad24618e3d878d57eb37ac5d410088855abd53f9408741c66c
SHA51221005e0539bb366474d243fdcafc6941d34658b8620c6082391224120d73439158b6a58b8b63ee65ad58f7c3263b18dc8c230c51713e29821ed312bcf963a73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df925c79075735dee2d8e0ee67d8fd9
SHA1b59bb3ed859682b06f5da5b3801a47698c889223
SHA2567570c4f848a7681b2ce2b5d82d8f863ddb4200698da04b10edc2ea22005b3c1b
SHA512a052df5e2d422bca14160b35ab64c1b3ef88f6881ac435871eaa173337a9e5cc2bbef6e80f79ad51c1d7e7408c47b003b97568533af99075dfe0b8ca8ea3bf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b11bc0f9cccd69784c9ab6e8b8edd9
SHA107b388822245c4dd6466579203047914d47ec502
SHA2563e2e683e1593558f8de154c345250f3f01367a2944d30772bac8ef2d96463d1e
SHA512bb5215920e2dd9d5fc97a942753d3ea7956444f63a63f887eb3dc477f2b1f5d8319811d7d2d01a97718cd1f2a54132e84b96f21ffd58cebc1bdd860750565bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58017f31e954c044477c4f836fcc50166
SHA17c7065af7ca69c8588518ce27666bb3e1c0a998f
SHA256a0eb2aded46003512badf87e493d7d8210c202770fbe0d5fb471e3048356ea8f
SHA512659aa3fcd61ca5a88f7b9540ee2dbb7fad0ae797308a615df2846d4d2503560930b4167ea71750722d7c38f3e57b067b37372b131c2d394b755ee0f33096fe51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55167bcf0076951bb1f1b52fb2fae6142
SHA1f665b9a3edcedadd46f1d4d9456b75a547f5c2fb
SHA2569e763c2efdae8d04364d7e0dfb9137ffb95f801ad57bb36e0620719c826b2ae5
SHA512838768fb4fb826b899e595bd83059009ed5e2ec096e37dd42eb097bd2116dcec06580a7b622cac08726a1d632c860c674b16f42944fd1f6d5a726f60c0841336
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\f[1].txt
Filesize40KB
MD53ab616fc8eccb75e352070c83a1f6278
SHA174e01d6f557415d0d1ed8e40d18842b8f2064878
SHA25676dc7f3640d51418e9ebba851006a62c23b81be53d730ba1b349193bfc464dbe
SHA5123fa5e668334d4eb3e1543e26f37c5cb53c6b6d593c3619042814243a4f17f9bc160e0006731c27fa6b46d9f8705074b423ad6c18ff5753f153882956c4c83fb0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b