Analysis
-
max time kernel
131s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
2bd0acaa18ddcffe9b850c03af8d297b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2bd0acaa18ddcffe9b850c03af8d297b_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2bd0acaa18ddcffe9b850c03af8d297b_JaffaCakes118.html
-
Size
7KB
-
MD5
2bd0acaa18ddcffe9b850c03af8d297b
-
SHA1
8f8da23b05ca3ab54b35e9234fc9ef7b0743a8ff
-
SHA256
f21aa3a8b1260f893b849dcdb86d1a141c14537eb305e8353c13739f6ece9bce
-
SHA512
563b1c039d80656d27e13c34100ba43a7ce42cc939899e8c4af19d757ce274c5de921c90b1f21f0b07d8cf813cdc0584ae9e87f4f070fd308617f9479d4aceaa
-
SSDEEP
96:BXnBO1aglSNfyaQ2e8QMHNtP/zAr3ivPwBK9EuG/2j30tWnIVMO/0sQDj7fY:tnYak/aQ/8TtB/Erqd9EuZnkM5vTY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426614782" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800cd3824cd1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000006a7fc17821468ef267f231659fe801d8cb4f1dfb3bb763cfa3d7c87caeb1de0b000000000e80000000020000200000005a312c729fb1cd4ed7aac87182431b63909088396596c42dfb199558231be560200000005a8b9ecbb511d88bf9881c790bac484732ec8e4e44147ba994f37fea7fd5a856400000009ba665af46a67a23550dc247a3cf94caaddbb3444d4b9c3beb4bec0c75c2388543ca37a1c225c933bfdb7bda02edafa3fdd3e3a2501d143206ebbeb438a0c1ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB94FA21-3D3F-11EF-8912-C644C3EA32BD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2696 2548 iexplore.exe 30 PID 2548 wrote to memory of 2696 2548 iexplore.exe 30 PID 2548 wrote to memory of 2696 2548 iexplore.exe 30 PID 2548 wrote to memory of 2696 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bd0acaa18ddcffe9b850c03af8d297b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59462ea87d536d57a14de6fe3d965e698
SHA1d9b6322698ae063222c8f6d245557fd9ee98dea3
SHA25663d9c3ff0b0cbc6c0ddbc78d034fdd71e2e30776946b619d197c821e5dc8d298
SHA512b7df32eb95c138eb94aa0d96970368ec82b8252f0c535d0f4c7f8164f32a7c35595f5480363a837aeedaad675cd2160ad3437144d0fff61cd00a2edaaba5ea35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7874840937107e760066a8962a0f82
SHA1b809c27c033eaf0fcbf04b01301854759730ae73
SHA2569005d1c537e87d480dd616797405830080921032d84bf313488569c842e708ea
SHA512932b726700de766009c571c53bf7af8e0b92f48961488eed4168388762ce92f9801ff11468c3fd1bd3aee3fcd8169aa41c4d78b71796bced5beacc63889d6f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb0380c80145cda73cdec14d79ab0d14
SHA1a5a9f483dd3eb52330bb9f204d2e1f39cdf7220b
SHA2566e2963ad84078553925df9c913650870b117f60f2798fcfc315fe91b029831a7
SHA5122d63815dab4472c661cc94d3c70da0dd58ea6c4fd23a4e266bee93bfdbfab99b842dbf57c15c9affc54029b2cd99678a085cd18963969ca76f51a03a131670b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb361e0692f4b5fc454a986ef4b8a39
SHA11da0fb19c6db7d6d47db7e6f6942519bb8bff58e
SHA25668e44bbd90d165e580d29961aa4a805adaa21ab7e7a7f92893052f8a70b50807
SHA512b03e8a6cea19adaf37328016b9818adffef49a3a199b64da8b833672da1dfa2ffa5ebdbc6054730a088395ac7d24d2573f6830b6a29cffef8a79bb850f61b826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c34e117849f9587b57bcc41f811cf007
SHA19c9143eccdb728cafbc909c1fb36c6d43700aede
SHA25697c36efa76994edc3670f46095f18b3034f5e47a40bb44e3982f9df295ec5bae
SHA5125a05bbefec185854d87135a72c8ed7810ec89cb962204cea64fea4d62860701702656a4d9fcbdb06c801439dcebdaf53e18fb65920917e971ebd852c0b762d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb71f68d962b2bc4420b6166159c3f1
SHA11939388f488202f19a9b95aae62e9b1a6961d7f3
SHA2561d18afee7c1d0cb97fb3b83b1be8ddfeba083a0ee8525d750ef8ea9e12ee0841
SHA512a5e5eee8dc4564d41fc0c234f38772833ba53a05fa0d4b0ad5c26e4a14fd9b0baa471a763719f63c4d520300a4f2d81c0a46f545a82b649ae58f142e6f496b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bdbaae510a0b6b1ebe292fe19c9ce4
SHA11ab26a7624aa491333d88a8ff6ea15e32acfa235
SHA25605a51a34c30919b28959e01e8427af04cce23cfbd414fbd7db1f3f06951036be
SHA512c80d71e023e3de66a3c6a9f682949be3ce0349cc869591d32ab82cb1e6c8a2bdc8d0b0cdc97a5f0d0e04a39009c9130c09f0148586c344ddbcedf0709016162e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab97da4e789addb42e5a791e460e28f6
SHA101825dc908770a1ade90579e94f76243bbe682ff
SHA256f8ee31073a4211db340d2596a079d01553e692cf4019fc52112f89d5f170ae71
SHA51293b7fefef25d063bfe9a7308084e602ca122f82675802f7aa0d7925e96d2e8032046e7b43e6ce004ab21ecfcfb320775f2d84f909e7e6f3aba1b086ba868913b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc689d9f8596f051178e14dc317ade8a
SHA177bd0b8ad9475ee19fb093f2e1a7c21f3e586add
SHA256f73c20380d4e1973e05d9adadfa9d4b07939dcd7509a6d0f692f093c8e7056cd
SHA512d6b48dcfe207b73d021cd40ec2cdc1e87be00f44bc737de7380508011e1e8c2aa74a2d236833588c2b93d6c86508609e538bf86ff94cc57e2a34c98c0c873d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef32acf63c056eb53a5343a2114d8fd0
SHA170b28dc8d60e26bbd5c7c129d8fb90839af62a50
SHA2565b6f3afec999c1129fff3039e1c23ea9ce759a905ced2ac71ded3d1c055b7563
SHA512552e39c992a0a02cc893e4e308d71e15a41a048d6f85fd4c35de812dfbd664d56b2a65c767ef1029f71b236d777faba21cfa141e8716749f2614813b0bc2f38b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536935bc3f90e08000452274e80881c5c
SHA11aef2bae1f0d2e55b9594649a36a003ff8b0cb43
SHA256113f4f218cb2dd1f1badf429db57acaf7a62ae9777f1c200f43742df7c41c187
SHA512ad328102575784e76d37c713fe74de26f3e2275221269e83119a2bb3f0915305ad9047f5a0e8384ad6adbab6139160aa4769acf88d147719c8d547ba0923ffd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3f22a9351e3d7800b5f2dd2b27246b
SHA160662d2bd3048247664042e76ce9660945db5835
SHA256cb2e0a0ffda9c4d7fd0a2c7f67424f30282cf99d8c385bba392c368a9a37c198
SHA512dabfa0d75a4def5a94a4229b1eb2f2c4252c692ab99c12c2c8f40522dab6d3b588d45034bcd26d6c0c2714412ccf65fec6f6ccd7173a8101573f1646333e0e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b29cb6c7125f1e6c8f18e310966435a
SHA1074d460ba4bdf7d8c4d3526ef334074487a6bbda
SHA256ae207cbdf42d27295e24f9600439539f6f5ce452404d4ca9fcb079a8786df905
SHA512c6361a9b8510ec3232c311294f73128128b41bce1b3a7c2e054be75bb30e2f248cf76cc7b6e1dab215626046272737201da4ae8e6f52a0af5e0d3e4d3b368591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d101cda24bb461b8b7f7a49e4764cab5
SHA1a0051afa197e537cca0b881cb199907bc1c97f8c
SHA256dc11f523aaa00ea114bf72e7be58239f6ed26d47bba8c1b530e1efee5364ea14
SHA5123d7dba5436811de52a12f3b40120375f6bfe87d32d742392b54e32c2a3df6aba930b9c4b65109c7141177ed3ee7ec07f78247658df4e39a395a9d8e5e244a634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56346fb9fb6834196fd255f4308fcb146
SHA194fe06e94ad970ad452d4ff09cffd2127f16f989
SHA25641c5890561f3e5829569aae04598bb4e41a4d55700c97949fa536bfe48d5dea3
SHA51243a416b004d0c0dfbf274f441f6e33516d8cd0299dc5f8962d0cc1327a77ba42a3300ab68ac21059cace7ebcc1e28edf10eed261e7f6d708aef7ce3172d612bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c77c759789b5ec5420c21768f051e3
SHA1add73421346f0d9c37057a0819fa6219e6e76c72
SHA256f39afd75d14d25bd692e0bec48347f1e61f866b2745246928a3be69a66b21094
SHA5121ec968e092b7b37caec94407442c10fe47177fcd1a94bcdc58821fc127cf706c08fa8b4a0b9401a06856e476188bd172c18584a521ab8552bd9b466c38b8478b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49294c54387e41f69be8c172e94dae3
SHA106ad30ab74e5569374d7955da05e2fbbdce8b3ca
SHA256eebc96e8f8f97089eb34a217ffc602f7538085c21f154d7c912fa400f1998a85
SHA5129887183f6c2061d0d20cadb8176da44274101896111cc2558e7c29e10d63247308eec16cd5a98004271db9ebd977dca2d71f19282d4631323b651ad4f46a5a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d73c220b98bc6d2e210b688994fb8b
SHA168a97498934e06c523047fd60d1404d200f378af
SHA25691c74d39f0469c9fdf21c8a93b1a76a5920efacb8411e838d408ad05d67dfb4b
SHA512e2ecea0e336a18d433e0c959e92b15708e168d7717de59f9caaaf8e44f8a8a9b486fdf263f813b94c78b7c0d5d92db67be68d6aba89e64fc9100e9e84a2c6297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296e3a048023aa9ebdc3843cca471abf
SHA1425d484523d142e08d8ff52557b3abed5ed6a84c
SHA2567b5b49638fa2e85ca141ea02e6615914a96280e1605c2b9f7582551fe8f02725
SHA5129d55819eb5d933e232a2e20fd58ed0f09a9509ce86e66e2863ed4fa507be0d7ef6cdbafc27bee35b9a95f244b85596db5d4ed4df314ec46c1c3f8c2823c45462
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b