Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
2c70703a185890f4120c8c092c5369d7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c70703a185890f4120c8c092c5369d7_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2c70703a185890f4120c8c092c5369d7_JaffaCakes118.html
-
Size
10KB
-
MD5
2c70703a185890f4120c8c092c5369d7
-
SHA1
3b81ed32010df60be6103dde8bce47a74992aa7e
-
SHA256
02bc137c9b7e2744b031f4223be6c72618481d4bd0f24e94634f1ab306d49312
-
SHA512
3925ffd4129b4414aaf65daf2ac28dd6c1472a40924f5b76798c50b24fae785197c405a2f32926b2ac6cd0312f2b0ab07cce547f7040f8d78764b43a68f26d32
-
SSDEEP
192:FQubnre14d1OBMX5bzmHRKYIME+kR2RNUj0+tRPblM:FQ4q4dKMXhYVIp+f+IMY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003f341a372f3ec4f4030ff88638ebd8e3633c8d654079acac1d0d7225215711ed000000000e80000000020000200000005a9716f6460a8fd5ce90665061a5247d1db08972369596f02e934b5e81defa0620000000b5a159f29c71312ea03018e537fc4b9d1b32f7d0fa9e04943c6cd85d258db6f54000000091bd80799546a21a0af44b359bb977fe0246541c62cffd3ea663b945a3e027316f3eedd4b4744b408c7c77b8254e8bee7db8e89504cda9f1164d6051a16b635f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d069574779d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72C0C121-3D6C-11EF-9584-DA9ECB958399} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426634014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2940 2480 iexplore.exe 30 PID 2480 wrote to memory of 2940 2480 iexplore.exe 30 PID 2480 wrote to memory of 2940 2480 iexplore.exe 30 PID 2480 wrote to memory of 2940 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c70703a185890f4120c8c092c5369d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da3abcba4fac00b7a1d9feb0a4eac10
SHA1663305d152dae916807a005e38a0e63bdd8841bb
SHA256a22183bbfca8cb697bf125545162f17f860a3421e54f5943ba9eec1df3e71953
SHA512901e92df3e1aab6e6e9a964c25c7cb3911138cc7f5b26d8d05d0d67b3bc8caa6bc09df18965c80f27627ffa5ef9cdefbb8b8b9eff37f9846a9e236286eede604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8aa70e2ed4c432d5625e7c97d5a650
SHA123877173ba660b1fecbc1f9aa1952fc5b986efe3
SHA2561c08254a8e6e0b31bd29dc49a9913c392e1326f1cbdecb836214bd1e2ff6e293
SHA512105cafcfe8dac31009f9258d76f1726722c6fc2c89e610974f9ada8101c2045aa05ab560bb871206f7f6cd1334751669bc1f556269be4a9c3a43a5c7725b3546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f86653f887f26dc4f90a1811c6298e1
SHA12934d7153616b7c16285b838914fd57625327802
SHA25663e6fbec1544e63869cb312bcff1ad4858ae500b539e10be298816c77241bb46
SHA512ec78d048ed98cce57f4065cdec4cf6301d724679ab2e8e8bbf1cf8a6f9821c3f5f2e410727ed777d3a52142dbf63b2e4b1621325d3b1a4bd2dcb3b4fc3279316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19856fac6c0a7e109aaa7c4f0500f4d
SHA12611101ede9ab2d38f2d6c7459d007c6852bd919
SHA25646240c50cd9cb4ed09151f464319532f7f7f7f3578a89755ccb855e6e31b105e
SHA512be1d52cf8edea4746e069ff618d3a22466c5238ef13e51cdf88bd3b6ad3f5aff341c6467558c9bd6ad7a76a77277c1297f137bf66f7a9bd60296df336514dda2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563bdb08ce28ac2240051441bd75ec991
SHA111b60bca1ccd436493c275472c5bd37d8d12da3f
SHA256794d41edda1111698540cf1e59c10f877ccbe49c15741e00fa680442448cd07e
SHA512e30c1557c7e5d98239d1945a0e3716480a05acdc6ef6bbe3c9bb7495a0253d1147052d1f4a0873cd519eff9f1829660f9e0b5b864c73f45970a1b52699dfd02e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585fd0749e9777bcec6bec9552b25c832
SHA16fe9e2d63b63c5c86610f526957f1d877257e1eb
SHA256841e20351e518129d4dc20a43d377ad6c3432fadab681317e9ef29c4625ba505
SHA5128612419cc698efd53a267b2c2df3c73b4574d6129ef3259970c5c5ad2d82a7d8fe73d12c323470dd109dcba75795a1bc36857efb9dbd51fbea5265bf8805c789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b44eb8d9e1429228d40d20823337dec
SHA13da3f8fe1f4fe0b0be194c106750a12cd6ec26c5
SHA2563bac6d32d4341bde06e7d9a576291f7e5a15dfbb0e7ad3f0f970ad5b45df7e1b
SHA5129a5f5e0526c17ea8604d739b01be45574aab583e3a09c146289f8265267b27291307da365f7f71e084437e8a4fe7b6f0d458579107c4bfc02c523a46f9f7dd00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1103d41a2b14a3781c636597392b8ca
SHA1c21cf1bd4eba8f10f765035cbd77e145915c0dca
SHA256fe8bee7d5c9666c28f4280bea3a56137dbe07602c500632ea5e79cdf90fb58a2
SHA5128d97d55c79ec82448b603f7aa031ca634ce5e6b998fbf3caeb8b0363e3b04726ac3a22276a050500c59354a20484c798999784bc7a9e7d41f008a72e3b7477f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ab3a8f43e72bdcdc55b2c61672f306
SHA1ccdf7d0314dacb52db698c22a64fcd56d62846d5
SHA2564e4591114f07b08e0550c977a60aa859fdb1bb00a6c08241a2ccff50b7c22987
SHA5122dc2afa0b83b72307d87b930f4964b8a66c3f5d55c18793219ab07832ea13a372d31e655f62c2c15266f485c74d562101f7e9e3e2b5fa43423aa6c02101b1aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0d97ce08a65d4505c4dd27beaf5dd8
SHA1bebf5eb2d706e884ec1922186ad73ba9f7e6da3a
SHA256ada13be91375ef7566ad3870b2e203d2fdfe03fc02d1f5b31f387a9ed3740153
SHA5127a0dd500013724b99d843e2e1a76fca0381820845aae3960f7d0749151e579fd04a31ea637bc2c353ee19ee162277dafce96ffcc754f5e73006ee694a954919e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e65f632723b0ae8b5e0f870c5023c8
SHA15599c8c7f62ee940093f5bd65b13afc949a90175
SHA256c19e40f5f56e0c545df2a9109f64d5a0c694d8a18d58a4a53e7b6e0588aa5f08
SHA512f416d3e9237b2cf679eca2b07c1e4cc34fe10f2e49d70c40eeb6edb88369fcd384bf3e74b2c6384608cbecdffd329a79a7c37257b5d1339b3cc45e9fec2872c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ae6e780e8dda8afec2851929505366
SHA1dd1df048982d70d8d268ec635d87524c2c1f07f8
SHA256f4d41cbe22440d090d66a3d27e2f5403c54e4fffff1b84fdd1967704e8b4e52f
SHA512c0d0f1b06ba26270d513f60a84eceace36a1bb52b031c30fea60085c10ad44720907ae3339867be6228eb18912a307bbef5846d3c09684658ca56cee045ca351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c3d1724e621bd8f5acbebddc48e5b1
SHA1edeaf7304133e73862ee8ee8c17ed488af0f8fc2
SHA256f33ea8b10eb0cda3f88b21c3992c0b5e64d22be3e632b46cb0431c340288a289
SHA5125e046866478336240597fa110faf3dfa9de3a3047a5bba2c4203054b43b7b7fa373110e324ccebd5030202250d77581157c486dd6583561cff0e9e33605c2fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b801dfa7821c15be1eb866ad0738e1e
SHA19a2d848a39765b81e7421bee52562d2a204b6e38
SHA256b727676cd82876f3c79232dbeb0794fc2acf68b5a0a48e9426f28fed1fc6b962
SHA512323e010f8034573239c4ffa828d2d8b7091ef03a7cdfce0b0fc3893b3c0d0da6f0dd5e85369e228fa79adda653759dba814035671d7b24ef59954a0ff9f9f1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c82c18dfe85f1ef27db1874cb25832
SHA144dfb059248d2257271653079852674bc562e2a1
SHA256df533b77abeb388d400f7904608e8055d37a2a952686fd2615d0bbdac3bebf8e
SHA5128ee1f50f8e43f14c19ffee4a814f610fe2cf846cfc829d650788b5886ebcabe70ae93b0d06381c640fdee247037984efbf0127ccb7ca853ffdfe190249b68b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d8375a372848f3e210a8e777c266e5
SHA16e4b4aeea15397eaae70bdfa4ed84b202e74f44e
SHA256752ed08882da182acf8b7d0b250855cf4cf6d6208965cb2577f05a62ee1f033e
SHA512a300e3659375b6e13b709ce8e5985bb316dcb52ff6999314030046b9450945226b408ebf61979d3afbc76156907032de8ea0146d95ea80642223a16fa205de03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d30d985a31fdae56460cdbe997974ef2
SHA1ee1340a859cea4c23f788176a7e60743b20382ec
SHA256a67bc762afa53827790d39ec6523a406738f1d2bad622e197792cad19ce2d43b
SHA5125f8a5e716b71c443b453c39da224f87f2f711f5647cd02105d5d5574fd710c8f7388cd90d4d32ab631baa9789957450991410157268dca10cf2189499f59ea93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52272cd83278931dcfac51f521e5e609d
SHA169f628f3e643690045876e6772ea34baa11312ab
SHA256177fca74f427ea1d0187664a896984190a8da0c0eab8cfd9ebb22a9b34cab65a
SHA51225bc9f3725c17853498a439373d5d3ee2308b119f26da9a2a4eab757d9686c2c0127c85a7d62ee90a4c0777be83699a3513f32a2aff11058419a00d3180cd3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4dfa34b3f4e0338f400631385cfd18
SHA15bc50df3af0ca370315a8fcf8e94b488d66f60fd
SHA2567dcbc9ca2b5a5a197631148f2d54f484abf065f30ad2181db113b262d76c2bc2
SHA512fb053ab2ac6c881a415f2d228a49a23b75568534c3983a2c8316405487b2c5ed182ef647d07fb3955dff71668e57cf7d5b791d7940c655bf9be2a7df8731de26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fea0ca55faaa6365d7f842a15e704ca
SHA1b5357e21562ec3958836fa33fed0b63af13831d4
SHA2564c91ca0a9cd93fbe6df6a583a5aadcbc4bf6363e9ae43cbaf6f2c7cf62a9b48e
SHA5123e74a986063d31ab3f2506289fa885b0ef37db8cc5ac8ec548b691106289996bd254c42d325fbde041d88042bce03478ae476307323f34d8340ee6edb7f6b54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa2b02c610dd401f413d65b7cd64303
SHA1680d7e5303c8deed97f238b7b9bf66fdc235a6ae
SHA2565258684d57466e6eb58fdb0ccbc481112a50248385468e9852ab06a2f8f4ca6e
SHA5121573aa19f25f3229eb750e29d541a2ccffe9e014c3158f3ac477c777dfa52dd7a46afc5bd98c837584d7f4605524a6090bd2f6e95d9f05b8ede8fec0f5dd6c69
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b