Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 10:29
Static task
static1
Behavioral task
behavioral1
Sample
2bfcf312b7bea8cc17f8aae39d6fc6a4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2bfcf312b7bea8cc17f8aae39d6fc6a4_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2bfcf312b7bea8cc17f8aae39d6fc6a4_JaffaCakes118.html
-
Size
23KB
-
MD5
2bfcf312b7bea8cc17f8aae39d6fc6a4
-
SHA1
b8eb3d0ef1536bdcd29e8856abcf9d0e87d96c46
-
SHA256
4122c47f46e8cc420fb7d7c69af15398bb850f246fc2db11ed6dd5dc07f22abd
-
SHA512
ba0a47c832183608bbe7b49dccc07d687ceb3003d30bd772aeff97baebde6bf24362a10658c0bc1bbad66e33f97716706a9b5583c77c8cdc4930d0051a441d0c
-
SSDEEP
384:FqoGKHzzPFS80IBHczgE0+mDIHRm6uugnQO/rq8bLqC6rG/UmsRvmu766dDajsjm:+KHzzPFx0S8zghTApuugnQO/rpbLqC6O
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f552b75ad1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426620885" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E14413F1-3D4D-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000db9d5d6d0008dd0e069ba25ee8b0ab2419f19360c22fe060620ec854664b398c000000000e8000000002000020000000d7827a36d894c18fb0d0166432684f2eb8c757e934a10930f9284def614934ca2000000067fb0604b9c1a4893be7c22fb4443559fde22836a46465bac904da0314a6e85e40000000bfd2c92371a4cb0a974d730c3b29d06f62bc25fcf185d0028c26d779c8c469b81a8c7c233f453e4b8b030dbb773eedaf021a1ea0d19bf599ae91847fabb832fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2132 1288 iexplore.exe 28 PID 1288 wrote to memory of 2132 1288 iexplore.exe 28 PID 1288 wrote to memory of 2132 1288 iexplore.exe 28 PID 1288 wrote to memory of 2132 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bfcf312b7bea8cc17f8aae39d6fc6a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d002b6444c3641d7e9cc020bf826aed8
SHA15a7e1cf973db5d142d052ea20a4fda551ba8fccd
SHA2565fe90b7d8ef0ca881ccc2ca33dc194fc860b145b756fb08ca43847d8e3df9a9b
SHA51287bf515998dca9c8303f4f3038b56649467f07e722986a45d32804a6d9c6a7d77d78910f09c04c11239336865b3ee9d6dfedcd7c752ffaa3a37175ce51ae2b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b360357354793809930da8bb35158cb5
SHA10738832ae9b7375339b1249a2b8e16634853416e
SHA256aec6c894952e0e630f02efeba1175daabc5db1a53e58e6dc35e91cbc024d1b64
SHA5122ef924072c43c39e377d91174bdffecaf7422f832bc00b280fdd07243a5787bc0a103d81710f5a8bb752ec41a486c9f894e7a6cdf538974c2362912314bf2fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c296e4912e3d9f725b0069ec301c0a
SHA1953dc8c0cfa0acdd51bca5ace120d53977ace578
SHA256ee53e46deedf961492703df8992a0205ba03456341ddcda931b7b448774434b1
SHA512eb65ca48c39ea0443bb19039f8edaae519700ffa4655bebb557d6d4f48e3b4f1607b98bdcce6455f1574946ddbb3d2502b69d2ca0492d3467708b7a90a8fe605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b52a0857a052b78ff862e3eb79d4280
SHA17b1f343fdfe1d2f77188e47b0cf84c18fe48ed70
SHA2564c4d0ac2afd89396bcdbcc9ce26f5fa43c9eb2e5288a6dea0d2b19d58197ffc1
SHA5125aa9571412ae5af6eb9eecd441765b7260d78ab95eaef41d0dcb1babce7e21650bda6bffb040637006f16f3571da20127a5ad92cffdd3cd0a8e9922c4771bbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d499eb408c7c344d847b6ac7202abdd0
SHA15a7f86748ed61acf265cb0e25484e99f7c1f8246
SHA25675095dfc23a15d563fb55b12b05c69dd6aba83a0db697091f51f8327a429ff7a
SHA5127864f5a6343abfbcca43db27637e85e94d6a37ebc7441f66022618b1473e6a56018789a5951a38520f7f1ba7499e55dfcbe65ec1f1be40bbb9dc5735cc722b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326d22f95349cd85037c593861156087
SHA15d5e85baccf5993e19e73b2ea079b802f1d20314
SHA25691ec02bad575f468d80f662383cfbed52a7aa3991da5276a314693fe531d7009
SHA512d48304a7dafda12a4d0a38c42f988c75302025663507b8277e23f70d64c9f89f3bfdf237e7fd5aaeab5c6a6975d0f4a634b5bb927b944098bdec69ed89058310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a4f033e4f35dea4b3d79ec584788311
SHA116107c1b9773820143a29022fe7f84f83c6b324c
SHA256894ee3b9024c9d4e21a63a09b51ca91ec89e69df7d06603a6eeee76cb4e6ffc3
SHA5121113e3604b1c3cdcd34976a509f1c8fa315cf9aec9c67ea4ba1d6e7a1ababc5affcfc6295e89ae40f5279090541c3f84f7c7d89cb4ebde16d65fa0dee3e347fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5befc9113e4028dd0aaa7ce306ac8fc4a
SHA1e815a0f4865c916584c97015452c7cdda5cf2cf5
SHA2567b0b64c509df363c3c93f69fa72c339a211123771affb82a8c472052871df1ba
SHA5128ecd32f7342fbefdb0150986c1be3dbe26f07b643ba8a503d12da22ff78cc2078991a4521915c7b279693a3f9d5f2d104f28eb1bc2e398d9ba3f7984b95cae3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513edb8b34e1eacef435de6e809652f57
SHA14c4ac6adeeff1bb875f0cb3eb4b438d141340993
SHA256850edc15ad548e1985ced2fd0ec88291dcab5759690baa4ef399fc9f32c5d022
SHA51226d5d41df0b55904f9e10aa4def157a342bf864a13acd2f8ccd2b99dc2878c058abd5c600c982295ec0fe5fdc42386d84b7bcbc54ae77e3a74339f61779ea13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50caa68c52317e0c2b10a648aaed5f9a5
SHA179c7c9000e2d7185a812ee7d7168a7a3434330b5
SHA25643e05421e87d474f017e4a8e82cdbe63c98c4d5dc4f0f11ec9bbc2892c45d049
SHA512f69b4df821f5d4b98ce895a9f1445d5ba0f6cddfa93432e642c2e179315c26e627c8538e6683ca8b6605935f400674881036c355d7fc502897cf21d814b908f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f25923f05db78b1bb176eebc72fdd98
SHA1579c62ed3d131e9c09a01a84d67b010228d367c0
SHA256ecea55950dc7f23ea86eb2e039930f93b02520ce1394c4b2cb00b21f32649588
SHA5124c86dce44044841eb961de904540d8aba3eca0543ea5b8fb2c97908efea0d6c2062318f2c0b905daf9cc8d6bc9a5a7383013d982a1a941692af2b90880ae7e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5468b91f533e1a131ae0a807c1337f790
SHA127b99a7580547dd17b71818dcc20e9329472992b
SHA256a87ed17c1ca8619222cc33d65b32b8e7852772ab5fa3e3c1a1087efbf044c14d
SHA5122efee2cb616a7b59e8e6cee54164ba4a4e15f5df85e31dbbb8524d9978db49d60247b46b3dc510f4cb2742500bf172408ec3d466563b8ad94735d3907f2cf318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a0b9d84d99c8edb625f2274946124c
SHA1a479966e1284d6b6a9af22e5f65508d1c9bb9946
SHA256c7877016f407c77dc66135a2817dad3a4fdc5af0845cd4381eec14830f814eee
SHA51228208fa6853ef62517a25b198992d40355a32e9460c2c6488366b1f50b7aa8daf1624e2bc8ddd8e70eaae6331c343d64f87af89bbfe915fa40eaeb4acefd799d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef52c798a48be3dadf993bf5b73c6490
SHA1f30601a9f810c885d7de8cede5a58b5fa78b5eec
SHA256eaff0f00c1df0bab7ecccf4c37d321238fe66436c5e79cd24365aabe75ff6391
SHA5121f7087e9318042018ae6921b3c296a2be7afbff43cde2534180bb32eb10eb9b30ccce59f993d2bfd7923866602a8896fdfad48e1ae528ac07df35c3b2ae8605b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7d86cab5d963f8052e93487b8346aa
SHA1f149316d93898773b6eef2fbda468f46c90dc1b7
SHA256bea088a0f9e9c1a7002527b8b25066cb6f18b478245bb87f1b5a73caaaf5202f
SHA512e697a50886142bb3aa9b1f60f8dc74cd1ea028b7af5d65f5b431a802daa5299283e851871d4761b4adb71c9d076b3bcd383511fd3c60cb8e1c626d2bdede3dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353b8d22fb715f5dcde827c0ad96912a
SHA1e855336616707c1c9aedab30e9047f377dbec7b1
SHA25619cd6d8967d7a2bb27f695ddbf3cbf2edc2b4ce3d85b8b0d9537b21a70005015
SHA512929368876ff2bf3fe0107c8d7ed50b9949bb57dd3e47d9c506c884520e96efd3b61df654f3e929af423650d7946d9e8fd11037c48f977c0b6445582f8820e240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf0320eac137bf4eac338234b160dbe3
SHA149cd6659728cdaf428f70eb6da539148e3fde731
SHA25637c083276fedaab32166a6f55a721d0ae1f5997c01ae912e6ba817bc7a64cf25
SHA51256bf66bccb8839a0081abc650627f3fbc7b7d1587470f73fa9ca7dc9d6b0dc6201f48cca0aedabde9f77a105bd6d8e963eb72d997e681bf670489eac7230c038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351c75e538fa02c444b043ac57e635e5
SHA10e9d02ddd3cc0a498c6b1c23613f8aebcb91959c
SHA256110ad4942e56e8950815cf0db6cba4de4175c1fd789ee50dc1ca0128d632ca10
SHA512e002aced89d7b22d44aa3d4c17a926b23cf5333e657ecd050f89f4e2772e2fb57ac6f164cf48d1778930cd374c551095a0f8ef5af27606065d0923eb0157c395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ecacfa40ee221317267c43cdc6d1475
SHA14b22339776ef68845157886b8fb153c1cbf2d803
SHA2564fdd92178cfa54e57fd64eab43ca7c363c52b93e3b3f33920be496595fd7cafd
SHA5129c5ce6a4d9f2fc9696e1ada4024a9675ae7cb06e78d0831f08ccdae000e5b4d411771fba40cd17ba5225e4f17a89e966ae10c5c31419e062c32dde11f572f820
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b