Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
2bd046d10fa45cf39d3bd6122b17a093_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2bd046d10fa45cf39d3bd6122b17a093_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2bd046d10fa45cf39d3bd6122b17a093_JaffaCakes118.html
-
Size
11KB
-
MD5
2bd046d10fa45cf39d3bd6122b17a093
-
SHA1
61913ba2dd98a6f79f01195f2a35536052fa8bdd
-
SHA256
4992b578acc675edf3391a710bac373644aa8d341fc07ed7b911ef7053a39a20
-
SHA512
a3720feff267104700b05b101537302fc592b42eaa52e908c095512cf7ccd195e6daa1a579cddba7bbe2983aeca6183645a2606aee2d99873ac642f29c3af2ed
-
SSDEEP
192:2ValIsr0r57MXxwT8x/w1wvqLkt1amvLuBuLbdU8d:salIcIQXxn/gqamzguLZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204abd384cd1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a11494d36cada348bb8135ad5ffdd06900000000020000000000106600000001000020000000a7185bef2eba384a5efc168f96969699968ac1fb3251b05b54ead81b488ba703000000000e80000000020000200000000e62ec9ec104e8603b4b87acdb6ea053019e8afb11b7533275fad3a72f695daf200000005bfd9ef21a95c58ca6bc587c5896baf02a9292336f845070b41dab2f638044c4400000009d1d3e2690983777c0ff5c4c4dc7b4392573c2251ea2cce1f0e9e23802dc19eb7c02398343594f02ca3c694ee5396e8c9bdf90592a26fa7ede7be28d0290fc39 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52DF2B31-3D3F-11EF-9680-DA96D1126947} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426614633" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2904 2252 iexplore.exe 28 PID 2252 wrote to memory of 2904 2252 iexplore.exe 28 PID 2252 wrote to memory of 2904 2252 iexplore.exe 28 PID 2252 wrote to memory of 2904 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bd046d10fa45cf39d3bd6122b17a093_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2ca0f05f8f849fa8ae04ef05184013
SHA171c91b8f76f85ace2e0254c0e2908a75b4c1af4e
SHA2569d058891b598476380586ec1a28db7f1f8fbd308533824f0c0f935b5bb771ae1
SHA512f529cf37269a5cee0624461cc503698faca49e64fd75a02a89a20bbd1618683889b258e19dcf542655b236f7249dee3a6c868f79c24feeb4f0fcfb924b0e43cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5316f257697ebc312cb7ae1b4b13be45b
SHA1765c591bd44e46c082072d9d29058192e3c44208
SHA256d64d4ba20c4eca48e5355868e4763b03f9602445170a03ee3ed5f7719bb68a9f
SHA512283f9f0cf497f64d6962e60f236272c6d9f99a0e42c7495844b875280f6bcd81b9c1c92234a373901b99efcb19f9b76e506c8f0f9c5385f55d9ff3fbe063f8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eec7e9a865349cf9ccb745494f3f011
SHA1acbd6864f5b4240a4dbb2e2739dd856180b20cff
SHA25665519b60e32ec2ff52a84978f89b68f9a7569715396cfb070551f168c7ec9da7
SHA5124de208d7dbae9cb525826cbd686b06f21f845b9bf65a2d07bdb183fd0a104627dc541b5a494eb9d6569a895c858b64d0f0d075b8c1425f2553488465ded2c624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7a819c7a6f116e2ad6b184582578b87
SHA19b43eef6f76c08ce137a76404a38467c34aee567
SHA2565b7c3ca3da7e55a49e6d1e1e0c7df24eb4d78bf9d6f64b424a09a73c1f8e9ac5
SHA512369a52134edf3a2fc6eb170c4a10ab52e3015d1df155a78cfd2d0b97717af340f39c8f90e01a3ce3d593f1cb3ea388a5329359ef127ca4cbf746bd45af05eacf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51701cbcc117bf9a6331a53b62710709c
SHA13fa9a274e234fd1d07d88733e53e31677e849782
SHA25612ef82dd7afded7c145686c95d6edbeb9c3255182c8c013f3fdea8fb5a44dcad
SHA512c81ff8322c3d6ea83e7ed2fede14d583baf3860e224ab5848bc9ec0b15cc4f9a491e67f1589d03275a2922245f930f05749ad775b3d662eb9bc6f8ba9c52c88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f51f3e12ae7bd1bb76af08f08cefcb
SHA1a13dfad3f3802a869c75e415c08942c35cddccd7
SHA25678511e03797a52d6e8ee73a0eeebb5dfaef7498a1f425ef6c62cebc47e739e34
SHA512bf5599268644806d7f4c1227e726e02dc503a74e58e21324c5d11d4a25725e4a10cc2e91fa88528ab4d09b3405a57262b944e8672bdb201a66f5b4bcf97fb840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59984f4738953811208f928b1d26c5d77
SHA13846e1b5f01a2fc348f9d4f09e94102d1ed7f48f
SHA256b447f20faa868a5c205be57e29cde2929ef5998c7a00f020806151d59d0b68c7
SHA512a6708d72385006070dcd14e42e5080bdac4edf972d78fe00cd708b83bf82f1af4e55ebe87d0f2284dd6b8e697f5bf9107f165d4877b630c6b810e1d5e0661810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e34e42923d3f13b90887deae5cf3d6
SHA1c520db38e881387c70d5b2ed3abf5db3127343e1
SHA256ac6a6143069cd7a9d3e872d8d4c502d88960e458836bab2382bf6fe97f76ebcc
SHA51259c0154be2a2130837bb097e142cf0e9545b7693f8fc6d5e548457e0afb7d31d76cfc6e0272270447fca1c475a38516fa0181935c3671555a9faea0bc91f7ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea5720085637a4657cb1ab6602bcec3
SHA1038f7ec13cb682f69a9b4225828ca17be3fcd7f8
SHA25684a013cce85fa281e99cf4d659ad9a9a946e7b2c60eaddcf5227e4870205ebb3
SHA512d00765920d4539a7518fd698a4ac9b322e2689439d738fe421961d913a8dc11f2601543e534252cc52d474965f3088902f31f2909b9d5d8bcfed95d2651775c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f080e14828d2a164a7cb8b26ec2372
SHA10db8cc99e7e899a49c0743487e6670e45be3f6c4
SHA2566fa915fec554d7c458ef429a6207fc71efd1880cf135a4dea3767d9fb257c65a
SHA51220bc7c833eb42d50cd0738e78c5038491db1c150b29302352075218acae30d5f6d25a0e05076cf2fcdde303945b148997342a7b26294cc30e792b586eabacb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d60b679f78b4205163990e5c69bf455
SHA1e23dd42c169e1f445975c1e8a8177f497e206f10
SHA2567d41d4c0ecfa6b2f09c8e5061fdee23033e19c1e34ceaaf5c41319f436db0223
SHA512ce426865932712aa3dabe8b5c4c66763719f6988fc9891de5a0432de7125580c5df75c826875193efe464600c598b222c7f2bf4bc132cee2914cab5b3c7e5784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9ddc7adfb1da733763110418a752d2
SHA1fc533e95eaabfe973503fb32c7c0101375e628c3
SHA256f696d2ddaf6a49a82944013459edc7454148f1b2f92ff8a548bf1c3e69b7609b
SHA51211d40ae76ca76cc7ae194fd5b5c79b29ab98c106054a0e390964044ef12bb98e7a20212e3d24f2df2b9eb6d1ff42292464282ea2d26652dd7f4d247f225d783c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b87ba52682b0fb9da8bcbdbb6a7841
SHA15581e68bad056b1316c4cdb08d955ac359791336
SHA256c6c85d2f6b66462186a04505c60dd4588266d4eb23dae31c15f7cd7de37db886
SHA5129b4f5e622be27d77eea68bc13f764da6b4c980b0ec2bd8d535ba2e41acc789f3a24288eb6dd391f021fa6fab09f9a8a4a626e22569d8c954a6f755f087bb1b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4ab27e3b8ffa9f2e28a29e21b94c9a
SHA1157d6f662f5e2e6a7c83799618c8bbf93adf5b17
SHA256d2dd85e6e24779e2e129b6135d177632931b3ab4ad51027dc31b43e101584129
SHA512486c5299da18b1f707246198adcaf1711dd3f6b31060a609cb10005b462a2fa82f803b0c7f58d67d034f7d7464f7dbfb0f216adf85dc835f701ac8c8e8a8bb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bce132ac6d6b216fdd53532efa87097
SHA1e97e8b8c4078b3b58b16e7a129e61fe558c7b437
SHA2568355d0447b4b2c92346e67bb0da92b5718847c99fcb83596a734997ffd825c2f
SHA512e5c0329088a843c02ae50feed2b396bfbf2bcd00585394c969992bf9859fccaf5946c81a7ef95d513f67e5eeecec7b8836ecf5ae27d4fd1fc007c60308d0d207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564072156350629a77476f4484bf51245
SHA15a569ab2b93edd9f3e40abd278b483a25c825827
SHA256d9602ae1927f3e24dbd35ab90cf3c136ee7f93dc9730485ca32e4b6db4f9d540
SHA512f5342fb0812277aa85576cef40dae54f8c8cff2dd1ed33cd211abfe0c01220f51e0196799e6287620ded35ee67f869f07e2f0f78aeb320efe07f2629f1a2492f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59065213faaa3c78aa0711d09beb83bab
SHA1099289bc460b3284dcaaf1cdee01ef6f16dcbc83
SHA25635aeb7a1ed8c93127870dd09e6a7b4e5d445283a64bae7dd6e606e5be2a18de2
SHA51244ad6c12200bc54530a9b6b8e3ad12cae9a22a11b1e9756afbb0211f6681f905524ceb18fc1c143208c22be13e6cfa4ea09e09111ce96bfc129e75ef541d4146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f700526afa1703682d4195a77c308dbb
SHA1adfae5fe19c9dfa80fe8e347a21de77cdbea21b2
SHA25644ab243b0d0436fd785304bdfde56202f63ae0f111d84aa89160d9f5988cf429
SHA512b8c4079d75ba15fd9a74c7e328858db501f737c34bd618ef32caa98bb43bef6fee8df7eb509dbf9aac2faf43900b0a8148fbf0a5b01c8347350ac1ea1267c5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d702fbba0e9e522fc96be7ef553352
SHA19d9d5a4984b9daee1d067c0c8ba2c19af999433d
SHA25643f90ddc56efc1f44959bfba8b29908e702a46c9f894bf02ef2a8a73eb6825be
SHA51285ea44827c711cfc6634406b80162fbf49b2afcb103f1f751463e14d5fc0d37f798b8119da6926ad4c6a43162123aa371089e43234950170bf8d12bd6c126533
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b