Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
2bb7909d41c73a772dbc1b8f05bc59ed_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2bb7909d41c73a772dbc1b8f05bc59ed_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2bb7909d41c73a772dbc1b8f05bc59ed_JaffaCakes118.html
-
Size
6KB
-
MD5
2bb7909d41c73a772dbc1b8f05bc59ed
-
SHA1
527ce4f33991cf2d10fec0060e0ca0d5c49af24b
-
SHA256
cef58f2b19853e8aa255e04b928787ff9c00df782ceeb0013a40905ac97d6ca8
-
SHA512
12fa2d816bfa2877a4d1d162fee618ba6150c1d0ca9080e6da113da1f9265363ed621c89210324fadba9bd4aa80c82c8ce8d953837a515df8c3bd0b6c21c204f
-
SSDEEP
96:uzVs+ux7pWLLY1k9o84d12ef7CSTUHZcEZ7ru7f:csz7pWAYS/Sb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000000e781699f249e1ebe4a23cca824f253e1040d81fe2bf172d8a5937f6fd84c2b000000000e800000000200002000000077c8333b5c6fa32276737de0442793df8db59a98054972ce15615734c949d870200000006ac8bd3ce43de88ce1665ec772b098723aafc6a3e585cf5c3b867a0b1758527f40000000760bb8c2f92b609b416f549ded41b2348fd533708500c3968c9683d6142f5aca8eb560e2970bc8d6c9e713e9c204ccab34605c6296eb6ad6359dbfb2b9ec2877 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f48fa444d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426611403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD9A45B1-3D37-11EF-9FC9-7AEB201C29E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 1124 IEXPLORE.EXE 1124 IEXPLORE.EXE 1124 IEXPLORE.EXE 1124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1124 1672 iexplore.exe 30 PID 1672 wrote to memory of 1124 1672 iexplore.exe 30 PID 1672 wrote to memory of 1124 1672 iexplore.exe 30 PID 1672 wrote to memory of 1124 1672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bb7909d41c73a772dbc1b8f05bc59ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3dbf0cb1fe40a04fbe820a9bac50624
SHA15b881ea5fbe514d08dd5b7fe277848b812f74550
SHA256d2e0dcdedd4d5ca7d7730794b570b9d803f831b58853c1e0ef8eff46b7e607da
SHA512d87e8b50e40e55438a4678b41c3c6bc060515bb84a805e2b4c75b1ff30f40d7d94da2e5dfa0153bef6544f76ff2975f90e07ee382f325538e7dedbf11ffef17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f271fef21a3a1662e41d84d16a675276
SHA1419c18a998e74c4af2c70b27dc8bfe4850871416
SHA2561a381e0679037c44c1977599a305b87a753e5394891130862c7e81c8dfcf7a13
SHA512b76623f877119cb02f6ba054eb0031b794a39c18490bfa5af8dc3ef12e8664f3be02417af527d57c83b3bf3c8c8ccfa5d6b731294a2d16eba910b40be5df49d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58afa6b20ad08bfc81ab6943e713dd616
SHA1b16b95532a7fbe325c6071c665c1836d3bbac48b
SHA2569b98c2b35ceb4894d30f54e5c7dcca6c688323d10987019d9a13d0b9c6e281c1
SHA512a106ef21152f0a27619525885f4a6297dc56c73c006f0bbd046b0ebdb7f42c4685deef17b36878f3db8bf04ba2f93e55176f02cd2c3dcb2f5c2cd4432b68d0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8a06a3711ca77bbb1a421d865276bf
SHA18c4f3ac232504fbc8cb803a226e216cef0351b37
SHA2563b2728ec435fdd6bef971967d5d769f2d09bfe5681269479cf70293abbe3817f
SHA5128e58f2b14eb35d863db9bb576dfca1e6e2b0514b3b0bc34546ecb6c4e4c786af15e62fcabf8275ef31c9a5bfb0226101acec867c9209295385ebfb85ac2df6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54489b9d7f88efd6d9b26c2faaf518b
SHA138d430411122c7ecfb3bd313c4d5c19009b7aefc
SHA25662a1e09207175c0a65d86b48d33f1a58c29fab4f95b339a67c5c3327e7f7463c
SHA512c3c4a0d328b1e76d17ce7f8a9b01ee4c5d4c85c67512e25e2188e96c5ad14e292878aaf2ebc5608aacfb912b796154fd751ae1ae093e41183fea7e23af941a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9c0b2e10d9808cf1860cfe25a2214a
SHA1e12baafc460c1b16e15e0d8f4abe2372681e8184
SHA256986c1444aa48fa744c57b1d476c8a94af00c9bdd44e9927f535ec0365c1af4b1
SHA5129567511efd1e88ec3463e49a3e7f777cd88e9f4df4bac15d28790fe7f9b5349851ca987f0dafdb4b3137f4bf1e2b9f509f8e22586b0f10d6ceb5a2b09cbe43d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b29772b16bd2c2c8fc91eb60366bb06
SHA112c429f16d312eaffe7898c913e1ebc82403db37
SHA256b7f18aea9f46e3dfbeda6c96f235cc240e58ff0e4ae87a13ba105f77e8d90dc4
SHA512281c7f813a567697ce44075907b37ed8eca113dbaf5b723278e47ec26e31c149cd00c51a36866a5fef07adc761e3a24139a52dc722e0efb86e21d1e38ef82615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e86db84139c48d84da6175c37124fd
SHA1fc7da421051b0f522e0030cb4a6911de94616734
SHA256c2acbc140750a3d51372465c9eed7a61b363e7276b6a64f461d356ed9440bdfe
SHA5122e5374d072cdc584033487d8643fed76ae309e19ab29cdafe620f93a19f59eeb7fbe24b236b53566d7cb4581414413fe09c4aa093a50c4b32b8b6337104b7703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44e8f7e7f13e6bf563cf333b455fd60
SHA107659afda4fbef9735e91c32e74d868b68fc3bbf
SHA256975f74d3475d252ddca4519b116755fb7d69ecfb62663e0498fced44642ce29b
SHA51266a9782a7cbaaa6e63c589e8901c430cda4f7058e62d17ce714c9ad322baa68d8439a1d81793a736d50ce0d89aaabaa509c11b7ce799702e07120682eecec203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a2899f2e376ed98549b915676526e6
SHA1bebc1958f458bf90e6cc1198890d2105333a0c0c
SHA256bd602333415217054426a7d72046ea406c6db5cb47389fd19150fa05b6d6b40f
SHA512563cfd9303377d5886c3a1593bc3db25faba88b99ff710845135db2919ed02e4084dfc864856f66e00dd826baf46d77c97d1cc36642a8b63132512f7850f960f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abfc54a99c3240f6db4302f865bb65c
SHA1384b8b26418dc1966fe4b413970f2d7804b118aa
SHA256c034cfee74b87bb5fa94f57147d7995506033d69c4eecb2da0cfdf8a15441167
SHA5122cefda4942db03737c9ddffc79e51b8a36f5db67df3ae2d17ac8339d3d9170fd215bfcf98d24b810c92a4ca101184db9732226ec590f448529e084e8c87ab025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e6debdd93c71e0ac003223912b5bd0
SHA1e6724a447013bbe2a397b7e4286635f9f52f1f42
SHA2565c9a6e81ea56b787ec50d7d7e1112930994b92f9f39f0cc214a4e8499239d9ac
SHA51277f859c49dcaa10107e5a2c866acbfd09d401053746a29131b6c201f79ae91ef7804875738096e7b80ca2f8f39cf4e2f28c5e0bd3ce2b7fb0c8f1b57b5a32238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ea95564da29157e69f63bd306239e5
SHA19f381bae1e64ef2d27bc3fe1c7c7b5c8c56aae63
SHA25645c63bb49a7bd440bcd3cb81b95e13f5cc44de502698e311483919e32635a61c
SHA512721b88a96e6a31373ad5ba7df15d4d362de189c80741c0cc568509ebd6b75ca96108a35c7067da3c946f47bd597b3b82aa19cd5565ed285915803fc8d820129e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53521472cc4f13a86a11bdf17006174a8
SHA14697d58ee5effcfa7138a3ea6c890e204b1ad01a
SHA25629de75babb4209941878b1330bdc7e42ecfcbdcd88ee35fac866a7397a662a31
SHA512c7c90e903d9ec3c039d26275595b4075db8d1e9fd3806937d837fdba61352dbdffdc605dbe84afeb74b67cd676729ce8ffe3cf12ee2c7d36dacc4ee6ac64971e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6e8d0faad67e35980437da1f8727af
SHA1a1c3215a49a31840b45940b62cf42a2aefdab5c4
SHA256471e00007883a59e32fc6a2441b3c5f4f5e64aedfdf5a146e542982d6cf83932
SHA51299ef1b59a10269d609c039dd398ba47368fe01759eb7cd673ab33928932374db752b6cb91a1959b7e7bb305f8f16a25c3884ccf60f6bf5b34dc06695cd8dc1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58732a9194f0a6f364636dfae03a4f8fc
SHA1140f5969131ae2ebc204ee2a837bfa6b96253b74
SHA2560c77553d8c0e9482ab353b465694156748bb8fe230bd2608d1c803501bf81312
SHA512bba3658c8428ab78dc29374f37bcdb4adc3fd7390e955cb19da8dc65ee5afa2d47a4ee674b2917a4159d505a15fc4f9c29e2d53d9f3385b81830fa66fb297b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59030782c8584bc0e96090fd1e098de14
SHA17e7614d402b1b1326783a5f85e6cef21649566e2
SHA2567343c2c50f576054b5afe8a58fc89dba35773b888eb8206a8dc35615df781ae7
SHA51224ae6bec1b133df685c48bf836f110b48247ef6b376e004656686ddfbc9e1b852ba8d2fcf95383d19c9049a3eac12e906c6b77f6bcc9900188bf70d59ebeeb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6c910a853ca8fd48376eda26c2413f
SHA1678d691e1ffc5db21857f44fba22d941374af170
SHA2567aeb05d5cedbc103a951149ee2421173a901e1f38d174bb91f3448651213a82e
SHA51237b6f8874e438c12f436adaae152101b0731fbe82274efb00262738788b4a0f3782137a35f4eb129c832c7e9561e8d51f1c13010f23687ab8d7cc34f0d79dbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f579140d1ac92a3eb740fc4d58897ceb
SHA1bf6290bef1b0c376a8f3e1d91155e5b285f5aa29
SHA2564d977edc032f11e74dc057a84bae842efba4382686776f5c254600f101cc689a
SHA5127726e7a5187b79d5fe341d06421e7debea5bb3ac3a8db97ed145dc05acd108421beba70da33166a457467c4cff5557a7862d5406eb73a884609dc1123e13bb45
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b