Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
2c0878a9d81ba5843d70e2acdb559898_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c0878a9d81ba5843d70e2acdb559898_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2c0878a9d81ba5843d70e2acdb559898_JaffaCakes118.html
-
Size
19KB
-
MD5
2c0878a9d81ba5843d70e2acdb559898
-
SHA1
23abcf294817ade23eed028ca3702d6aaf2bbdda
-
SHA256
40d14fc329c911ea82ae0b1f4801cff2152141b2ae499be075fd80989b7b4261
-
SHA512
90aaf67e80ff4dd0bf855e302282c9c4f0150e96d7ace4ff10e513b8752b8a3efdf6909910165945341039fb292ef988687074f07b79d885cf880b50e345a08e
-
SSDEEP
192:VQ5cVZ7oxovwLM4IO4ba08EFhI04YLXpIdWZSj0VuPfjCoHH+iXypzgUTLall0tK:e5cVZeZVeMmIdWZSj0VuPfb+rK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8746451-3D51-11EF-BDC5-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ef52c15ed1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426622615" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000073fdc2c96ee4e93e4946e513c5c56f61c3fbe75361adfab26c1029dfa2ccd5d000000000e8000000002000020000000bd8dc0f441e5881b6570961450d617685380a470ac7e1c0773d714439b69a1ab20000000a4cd24ca0d5a7a8e693d617abef750bdfe458dac96c75d46cde0decf56f0671d4000000010f20c3e749cc519bb5c3751ec3607b4e7d909b91318e143b5c6d3aaa7bed108d8d7b8628a80a1fdc3093fd5c3da490699989872f5e935296d04254391f7a3ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2464 iexplore.exe 2464 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2524 2464 iexplore.exe 30 PID 2464 wrote to memory of 2524 2464 iexplore.exe 30 PID 2464 wrote to memory of 2524 2464 iexplore.exe 30 PID 2464 wrote to memory of 2524 2464 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c0878a9d81ba5843d70e2acdb559898_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3991abb0719f7228be0e9d8de888a02
SHA162d5580629e2f5d544165cd8923e0013d282cd41
SHA256ef974c1940a37f17ba3d1830390ab3dcbcb4efc0421242602096820fb72508e4
SHA512cd0c3726a9a7dbb38e1c29a71d6e11548fa4201a55b17f3ca77aa44feeb503202faf1e7e3e749a18821d28f718fdfb4719f44f4794cad439ccf0e3eb01e2eead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5466d59ecfde3cb8144daad35019538bf
SHA1014644330eab3c554bcd830cb0b18a37e99553b6
SHA2560c1f9b164e47fd37fdebe0aa816d7d10de265d1de688bb4a4906f21f90842c78
SHA512cdb3b4238c6276886f5975385b48f76e84efbdfce5ee0f069d24c286bdad821ef995569cf32ab934325390e2616a7e3574fa7f5773a14487c9a7f3d483eae21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f87ffcabf383d446059d1efcbf311db9
SHA1e9ee848ba404c47d919c7ba7b672faed99cc33fc
SHA2569a76aed2bb6b24929ac50b4e9e45b1c2654ecd745a098f4e5983e4dc15cf61f9
SHA512de1a4ebd81e500bb39f8333244ba85cd5086699e60e5f58cbce1a8093b86c5d0c59dc45933c411e8a2021546ecc98647c83e6af30bfaa159acdc98d2676ff85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c9495850c6511026e5e7d7b51aa1ef8
SHA167364d7e89c04681b4d9befd200215157a41e434
SHA256033452d8061fe542b04bf5cafdb5584fe4183e85fa3a5e799ca65b23377e0f93
SHA51264440d696a1c1eae84d1674e46e475b7228ad7d6d99eb87e2e72cd1f4eb34e78cc35fb0f8c9254b864d35c5f3e4d21bd6b5cdb711373ff7bc5cbd4fe5d908807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e5cd2a7ba07c3e326d7cc6d9683c9846
SHA13098ea40cc1c72f8df7d89a2f0b1c3986be16289
SHA256f18c70dee55e1a31e8757108ffbeb021e10d085c5bf23b84f426953ce37754cb
SHA512a32390f83f2669fde60ef73e90fa84fd1811416a84f409bed51d1e7e1101daf9dec0efc301d49970e465fe88d1405dc8812c531dbf094b8f881f94378f713b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5851b7c10599578c55d44171e2727b59f
SHA1fc75bb1c70390b0532df444a6e2bbb4e314bfb3d
SHA256c99519f9227ec49d0eceec9d9f1c2e80a224d66325274cdeec45c2fde1422a0b
SHA51298853e7464c88aa792384aa67af11f3aa8025906faadef00c729bdf436b6357c058c5771e33f679398c15189af6f392aac0d30095f36712355254a8796f812ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD563560828b3c213202c961a524af6f1fe
SHA103d4c5a45dc1c392a0973363fbb2d725a9296038
SHA256967a7c15bd3eecf952f0af6ce061a1de74fbc676b83ee3c91cc1ddb6e00c776b
SHA5128de1abcba256305c79a60a7aa203be9fc74d6de9a56e8cabe999b142427bf59cf1c380c92e6debf9cd1836b3b23dcf0188b91560b679501820881661a5a79e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b667fa773577d8e5f8847dabc7839430
SHA1575ac5c040b8be570a7d3c12fd5d5c9a6503abba
SHA256adedb1e48883a8a62dd59c2beccd6400ffa9f813eb8006da7174c328f0043245
SHA5125a53f0ecbdf2cf3151782e896f1b846f7ea8d29d84d2763d4f19a22a1f5101bb4c60e92806f76e503c009969f65904fa50e9d4868a1c12541697c7c1dc29833b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD539df5bb3d4158c219929f5c2a07acd05
SHA11f9c253b86e1062a17c01f86fc33d9e30e571756
SHA256439dbb35b04ae33388a8f0285e203dcacaa5da4633af3499b12c99e9a7202317
SHA512d7ac3b725b4191fd69fed024762b71dec4836dce7810ff5287c2c61401ca2be567a9b680722befacf55903b9d19eca7ae8c028407e7f3c1ac9ae10bbeb9cfd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5710dde7ce76346a51bf29ade8183545e
SHA13056ca89061a17f5b4914c6d5be61b47b8803cd9
SHA25608b54362634d016ce16db53caa351acb121a7ba18d2cb99b63b7a094ff91f3a8
SHA512f02ff6f061496fa98f2ad594b7526348b824c0c3debb2c56899fb0f7a0b3281bbc569aab5b0de2ed2d41c4b430d6158b6a124ee18af14fd8ddef8648fa213636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c443e3a202e35d8d568139eda31d3f8f
SHA13d3144688dc00eab309eff09e4febd79d84f3d44
SHA256d5ff6fdfda04d2a778f87fadb31fc4ae6895922b33d356d82d746820314eed87
SHA5122ba997b1f2293844839c6cd31142cea7c02fa2fdcb4c7d166e9e75f90a825628c5f87a842c87a977d1c71475ba2ba7c5813207cc2e4493cd1c36bd428340da3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b7c3099fa3d2768a528dc391d8f84d65
SHA1cb4382d9c4a7f7c6ee14b9c3f1be0b1186d9382a
SHA256efc255fa5e4ca66b12212fe3881422fa96b510f867b93d975fabffc83c5e7f6e
SHA512cbd03ed87a2550842a998fc61ca30b7b627cd53803c28528a37677fef548080c3f8dd86eb98c4d71a065bc991b8a70425bc7bc6d5dce2dffa2d10df660e06865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe328ebedf4cd78ba2deba80719b7570
SHA19fb058811c5b7f27d5add654a19e4bf5b28459eb
SHA256b0259c6b9094eae8f8fd3c3d72e89b05d8fe684f65fd781fbf101dc4cd5c91b1
SHA512a87f6c90699f8ec105f5a5e6a362537eadd27d1491b0205a0f2754c1a8e6ceef785014fbcfc02edb01619aee2f7b86385c2c01581f72942c7f7b24e3d94f35c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e65796d43c63ba69751ddae79c471bf
SHA1a3c139473cfb2cca9e0702f13e20e2e966cbb9ef
SHA25614c01f390865bdbc6bc5b8d2fa05362869cedc17ef4eee6f37ca8da187721df2
SHA512396b11e7fc51e55f0f671c7ec710bd2e779ea74021d3b770b2a84ca08f79c1e249039da43be239c1220ae6f164e9025eba9aa1c1360742d243778c08f10b4f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD568b807bc733a6fca7c3d2adbd484133b
SHA177d5349ff90d42da4aecb54dda86484dd9624abd
SHA256b6d0896597750252c4975b585ea5b25c674e3b53cedc7ba26db147325e981d87
SHA5126c175986f2ea97e0f4e32e3c645e53ce0caaa95a776ede1830642354f8573417394e062eaadf16e7271db914d175ae83ca64b10e377d421ad877a526d30b8950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5591219295a9e147004b61c26d7e19214
SHA169091eb7989675a8743d090a9ca5e69e175ef21f
SHA256e5b300ab7d5250c825f3ec1e8e3f4d899d3b00dcd61725c85cb572f10b95327f
SHA512d5113b29db04527b868c4e92deec579bad84d3a7b36fbf49426cc9f37330f9eb4ba958f9a660ff3e955bd21f8f2d21480493b6cba5ac86043d86e00d5bff1e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51109b81d9f77de00225b246267cf845b
SHA1a4ed9989bdaf77f6d6ff64030fa27d46e9a780b9
SHA2561c987120ddf1ff018c6ebf5c61888d53dfe8fffa55101d4da8856147a797b00f
SHA512af1c992b865a9f2e2a620f610268f74e38549eca7a75e4a4bcdc3cc0f1e00eebe810837daeaa8451a23c17a3f17af5af411a850dcb834bd4345244450bba2bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573b1679021212c1dfd6169f1e22dfa45
SHA1b3069b3b382d59f7531f9b71740efc9ad7a232fb
SHA256b1fe445d1c7b4564e2c340e3d050b02e37bdd0381e25ef7e7d88e458ba10e2de
SHA51220f41d46b0ad29c337cf06b7e473a836e1b44aef77d2c27003259bec0da760c2905ca72f47fd1c5c3a6a780585016dfab86d8c0ee5b836e80df02a5ea7737867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e1f68c8f7638e13bf94f67ed8de05850
SHA1db510af29ad8f70032712d6412fce961b34f2d26
SHA256d5fafc452231c19f1884197e623fe4419496b99c59015a30ff0dbe7fa22339aa
SHA512e69fc43716fb30360358a3c32799486743c424f7b200f6a05b03a8e704a492f4be78126bc59b4fbc645ca4eeb4890caf1904aa75e0911868d9dd25e7c54aebad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b