Analysis
-
max time kernel
67s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
2c477ec289caf5a8b881c3a65a4cb4e9_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2c477ec289caf5a8b881c3a65a4cb4e9_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2c477ec289caf5a8b881c3a65a4cb4e9_JaffaCakes118.html
-
Size
53KB
-
MD5
2c477ec289caf5a8b881c3a65a4cb4e9
-
SHA1
90fdfba1beacce4ebdc4cce409656a0d4cfd1bb1
-
SHA256
96312590309686017bd72d7fcec34e3c4411fddf911d0f1aed89699c1574e55f
-
SHA512
f74f5084c8532c60b1db78674169cab52c96eac8022688a8fa51bf1845979a39408e785072c56db4b79f4ff5417c18bb6d3c8602683fa924394b4da2d4c9b776
-
SSDEEP
1536:CkgUiIakTqGivi+PyUOrunlYd63Nj+q5VyvR0w2AzTICbb5oS/t9M/dNwIUTDmDe:CkgUiIakTqGivi+PyUOrunlYd63Nj+qA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000637b22fd1a72e4ac6dea2a052f853053c06915b4895ed402b94a3a70c110d0e6000000000e8000000002000020000000858742811268794b0616eeb44a7259a6d35cc58a4fc428202a6fa336556c48f02000000072eef7c88df04fca3ee75847908b1ed29c1337b4902da47c95225e81ca6f0a8540000000d21a026964d82706283f84511cd58ba0922a97e4153e9a3218b98daf7a7e8e743536d12f0e7db74c132395e6a4da1a25ff8fa5fd324123562d8205d5f879a463 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426628843" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6839E491-3D60-11EF-A432-EE88FE214989} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204b453e6dd1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2172 1752 iexplore.exe 29 PID 1752 wrote to memory of 2172 1752 iexplore.exe 29 PID 1752 wrote to memory of 2172 1752 iexplore.exe 29 PID 1752 wrote to memory of 2172 1752 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c477ec289caf5a8b881c3a65a4cb4e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df7f04e9852083f36aea42c6a8d8607c
SHA118991a40bc03ebe1167ac1b75a37120aa7e1540c
SHA256d5cb518f16dde75fec8456e4260796211a0315c27a60db47b31c8b8c447f5414
SHA5123b387570eff05d6b759af5cecdfa74c6d8dac05e3c19aea4009967ede1b031769eda4b6d42f01b869fe8b9fe83d940290be383187bdf80e95dc89ae02f5632ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb70fa30cc26cd326afc3f1ff770053
SHA18905d3cfadbe4943b9e1519b6e2696ba47c7e591
SHA256c32d2f7b2d9777f54f385f108525bbc3b1a05a4a214987dc880824d224b6f79c
SHA512f1506eb68af00ebe28ef6d4f0e5dee596397889679aaa9ea3141f221bdd044936bfba71a44ece30dedf17fd2eaac966fa7408d057600a1525fe24556487b738a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b18094967d5bf0e3c71b86d5435ef9e
SHA185c8f4a8432e2f55e7dae4595ca63dccababd08b
SHA256382706ec554ccc334cb0e54e9b31a425460d4c1479115aa4585365c549a09047
SHA5125e66a008074c0da56c5361d20969e77fa54d31cbf6ee970c20cd44f6d5edc4c0b0936a42fe7a9a430645387af1c7fd1a873434771fb5e61eb2f71e29ca8b7b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f59d92b1707e1fd0d353528f222e6d0f
SHA13eca5842e5fc3e114f7856a3c1c05a8b4dc04f1d
SHA256f0c875d011e062073fa87014a15f3d999aeb79393eb266b6cf50d39c7ce0e8a5
SHA512db9001409ac275e305d1ffc0eed963333a2289a85d689238bb35686e368b924adf102038e87bfebc856e840369e92ecaf67ede852865c3f5730968d5cad391ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57093ea3cadb812a1d9e865015e456a6f
SHA11451dade2aaf28fffc669b5ed7ad8c3e809bfa72
SHA25612b75cdc364bffad7222f200bb1c0880f36d273e4f0f5b57f99783cdfb73dd02
SHA512e06bf1350217bbb7951c4ca539cd37665135df66b1f6e3e4d87e939693d36535645a838be2855ef66090d0760a87da48e85667a9caf847cf5287113d908c634e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b043451cde7ef1c87566024c0c4b8da
SHA1916f1aa3888f69b279547dd165654b3929399b88
SHA2561b45bf6df4c8aa5741b95de6ab9031b1476b96197846bbdc21cde4081b19328c
SHA512d3564b3fac77eb4b9ac65a57d3b1853c5468c83fe5496e36f38f6a561b0e9b691beb2470a8d5dbd7b980f43fe1c4eba50987b6c470ad23080a2329464657d844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c70a5ca0bc95845fd8e207e7e4e36e
SHA11253c278eb0ac9554e03152b6a15af057c5a92f1
SHA256ca6772f309d73a07331908acff5a00092ff1395d2da25dfd57c6ec4c00a9cb1a
SHA512f809955f447f289b979175fa1534c69f8e56b6321126382dbe0c869f31b2595c4df8ea1ff9606020e3b89fdcae938a337416cb205dcd942cb262d36e7a891e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578521ae322eb6d9857000b84fedfd44
SHA14262e90b73ced17122fd84902e9ce29eb80daa0e
SHA2560448b12a194241382dacd20af710f61962f0128f3f1c8c917795fb8aaf5dac85
SHA512b59b05887c2730ad61cc871522fb9ff9ecd1a3aa3f0e4a9bfd6aaf18233a03c4950690b00fca22780b6dd6952247499b35d80177c3c96c38e696efe4f7056f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e0af80a819804e8fe6fd47bc022bcf
SHA18b6b3d6572e7221bb437ed4267e7d2d7fd4214ed
SHA25690f5d322def7ae40b6b185f44675a961f8e574ffd5b47891f23677460d58aced
SHA5125606f983b918b93bf6d3e73e2aa8cf9986c945893b8a4160cb5e6985f2c8ee95806be43a456254c2def2dce30a2f14f8055d5eb30b197ac49fc4efcfa3e82737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671848c417685a8d90776e1bfc98be49
SHA17e279f839bca5882bebe4c3bb87fcde011545f94
SHA25675996cfd5882905d635bd5a43f71825f480f2675dccf652b239b35631472a9cb
SHA5125f530fc376c8d00a42d41dfc87cbc2194e3c4292583f14173de3cfab454b9cc8a1d220b7c0f0d525addebec1c8cb2767dcb636ff0b548349e738f9cd8dab494a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f0819b988781787c536d7f9b8c55cb
SHA18aed291ef95ac0e1ef54ddf9de8e9e2d1e2d4f20
SHA256d82180e2779fa5f245768de7942ce7782d25fe1bc22ab59045ff87951aae5d62
SHA512a275826b1c2eb085f336962f56bdf7a3c3770428caa188b225dd8b5e668f51df6b4e4314b5d71d20f9bf02ca81fcf3e457bc359bdc838ab45ed91ef8326e7b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d93230ab9af4df810a1478a44fde18c
SHA1483f2f7bb23f1d720a2b019602a22062d1ad4ceb
SHA256448692b87da5c0e681ea4f42101c97a352fe4dee57f419050e89b5a6ff62641c
SHA512ccbdaeb33a0e60728f3e4a982a28f81e6f723e67886209fbfaea351926efb1e6d8921405a59135334e4437beff4ed55686d85d2fb6a0da5c54840e5243c12b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50960b33784a5de97d1761e3f72cc810f
SHA1f0a4bdccd578a153aed50131a7bcd978681af921
SHA2561253ee91d58240a44c0183ee659fc99c64b0f815ef611e2b15ce0dd4044274ee
SHA512e25cd99e6fe1bcf581e627cdc8ccf488e2b810b0900b94f04456a07988bdb8e80d348398b0bc1ee6e78a954ce6db5b91a236cd107f5fc471da762ef3107ae195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd6a3d3554c1fa3fb2774acd12e723a
SHA1568c893359b44690fb85b7cb667fad7cc4d52b22
SHA2565fad2f1020a9ea57b96d0737b6dff398686286daa148a7d9b5260b2f1bddbdf4
SHA512d0d194cb62e3ff88226e1cbbc792e3002d2d10a61d65a92b75e7a509441d14c0a36877697fa72f367e79e91297d85798077dd9ae7e51f97ab9de70839cfed607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55480225df326045f8cc7f9cd67f4137e
SHA1f06b9aa0b3e7a3184be3032805c7ae3855209f5d
SHA2560eaf100a2726d07c2a3af7736923c00787beb5edcb6b95be8f336adee589a85b
SHA512688f9c7ebbf8dd1ff8c71c161276670765e4ab07d4f1aa1cc6549b9b18da0a50334dfb477c43e82da9c78b12a5ab9998f8778acf97a79db9937c0bc5c2e6e845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56ea54e33b01af778a1712f24734943
SHA12f19bf51d62b4977bdfa794cd1b2f91252a6e13d
SHA256869a6ce5798e95a805aed906329fdf1f3056b91822b07b331343b2d7c9fb303f
SHA512c2671f6cfd863dfb0ef46173c39fdbdc0909fc15d8efbb6616588add29b1b033502e5bbd316165c24589a7c0be6a9487620838ebc63683d3118c28d9ddf8aabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54556d1a190f7ce89f3389db0e1bc3c68
SHA12698d0603b91b0a01442df650bdb51fb455b8959
SHA256336318474d997fe1e799d4806eb01423eac4d43c30dc2503b70b7c253de33143
SHA5121b76fac3338647e7af5174a16b8371cd54f3ca7ae5f7051b4f4962ed7b3144e54216ddcf4415616755320018b1b383bbee1fe4435e04e24cdb4b203e6cb6d1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feff0f42c6a2b45f1a2b95483c62d51c
SHA158dcc878e0e3412c4e1ffc2269b5da47b70bdb9d
SHA256b2d2bc4f47ac480ae37b9ddbb80f5506db407f4aefe626edc2e8626755cc475b
SHA512ffbb7bc0880a78b3091097730319d6c462efc8578992c740ccac416bc95c0005d672a9b88605d300b267d4b079ecabadd393e06f31d6f11be5a27e3700db085e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a2826b738eb1a9986ac0589a1c9eaf
SHA1c1e87a4e7f41f067255e4a82cc99fabec3a6c8d5
SHA256b51f64fe5f8f8b965ea2b58e43f0b1184cc8de8ecd723151f06215cc2937e2a0
SHA5124e6112cb44ed30591e4f28a6390e23831357be3114caaa664abc8518c11c8f3f3af34b320865d049624786d966f77f6608fb5f503ed95695e9c66598e9fea7a5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b