Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
2d05516662b7c21dfa2a15e0a066230d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d05516662b7c21dfa2a15e0a066230d_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2d05516662b7c21dfa2a15e0a066230d_JaffaCakes118.html
-
Size
22KB
-
MD5
2d05516662b7c21dfa2a15e0a066230d
-
SHA1
a8e4f20c513c6ab6dc8314f3337773d753e65a14
-
SHA256
23537c03cacf048a1161c107ad6d65452cabbefa8d1778e44dc731582fb51c07
-
SHA512
f2263bf701fb965a309e32b74010b73cedbf89208d18215c44743725e0e2b7ef67ad5d2f40776c1a1160e4832d076e568699bb000c262ba0902903f87d064bb9
-
SSDEEP
384:SpCOLGIZvES2X+L5zrlHA4g9cAlnIO8aE1d5:SbLQm+hcA9Y
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426646524" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000142cfb6c848778503fe6e4d8f7c83ff792d1c583604fc7286c8046876d2b9306000000000e8000000002000020000000b8b3fb6f47c6ac2430acaf688951fc75b9f3b7f63048e57e6d7f272384b87af820000000e868bca97234c69580f958ac9bb165b94aac9e7335fbdf8f89728159f6c1abd540000000bac0b57c98dcca7f9a7e63a4ccaf4fc5fa2599a384622757d1fd61fbb5ebc38b3c642b2de51e7b7002e52bfd4bd919ec7ae0d29657f1a5f932cca8eb2cdcb48a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f8768496d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{937B7411-3D89-11EF-A24E-4E15D54E5731} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1620 1916 iexplore.exe 28 PID 1916 wrote to memory of 1620 1916 iexplore.exe 28 PID 1916 wrote to memory of 1620 1916 iexplore.exe 28 PID 1916 wrote to memory of 1620 1916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d05516662b7c21dfa2a15e0a066230d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be8f203c4f131c611d3238799907ed76
SHA1b9a6133bc753bb61fcab1a1bfc6030ca23f5fbfb
SHA2568b57385c6fe2c554c5797807c34aa14c903142befa4e0861d229b92848e472ae
SHA512c2daab64f8bc2f375295495d8e11f431dea58c536fa1ae5e8ca24d0df271474d9c1c7eb7ba561ad38735c622f481fb19373be9aff0ed186c46dcefa28614691f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57aeca372bccad2705c0290f7e47592f6
SHA1b967ad4492b542319dad76c4f774e0a9525ddd6e
SHA25625a8c069e6e8da10ee2f911de2300b8870d0998842603a5b55cd2664f823855b
SHA512a519723eee08bef9109458c97f7261cd0f951b5dd6b467058e1b643f23cc166db24d4a13b52f5cc881333073a0a840d50efc969de708fc0655b02391f588b5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b533a39ab2073c36f9a5681b6a8a0a70
SHA15217ce8c6b16367ae18981dbe7e9d2347102bba7
SHA256d5d5626318e105afb56adbaa11532f372d545c6b9f82ee463b76b7ebefa88bc1
SHA5129acf32b9ceb2702e78d650d8a920de3aa4939051c6fa7c1ea938f20f67c073e3709d9beca42d50db3e4f265b382a36c01696c528f273041a9947b6d7bda7f252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD524c8ede67671a9f51af69f98294198e0
SHA193573763e7e1c8c1e3f2af5b02bfa3c804873cbc
SHA25625130564d03b72a6161841f70c0dcda0ee0d6b028c718c7ecacb7f506cd3ebd6
SHA512f18af254be1b41f71bed594dc4ac228ff1b3b8272aecc7fb8a62f9d1493ca6308850610cf97db6b6d4b4537f3a0aae455974c6d27419cc5b064e0fe319e0002f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59d17803b1574c3fa054920b8489db3c8
SHA1c677585f95635b519e87cdbfca5a15f9ddd91cc7
SHA256733f0af1a3ea5fad24e54ffd6f4ab7bb14424b3ce1fb594f7c39f5f7a9889aa5
SHA5122c38ef332db95859f48233ee7d3884adacb26ce51d7d3eb6e41c09a4a529606bc8b4a732f08ea53ddedd02fc8cec9094a0077ba82282de42f4a5d1e9f0ff9d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e04c746afb13316dc867ff847d8504a9
SHA19d67ed433aefb5a5561a7302ee066f618b832d3a
SHA25624465da7e2dad61e581f61195ec5b0c09575126024cbb82402c8ee92ad128392
SHA5125f672be367a4785aafe3e49a10c8f1d3e1298ae2f289ab19d1b83f9502e6e07584e3de6caef5db83716a3fe62d68b59468dd7fcd0044f1335d5b9612f50e6203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b80021bd9a54991bb3fc993a4dee60c3
SHA172903653bd15d162159a84cdda4bb43dff5f8b8d
SHA25635c36d466e5b14ca88c4b705528aef2d10cb6369641a7e99fb3bca4bf0adf081
SHA5120306d3b4df7057d88348c2abc0e50695a9e65658e2c55d4f7293643a4e3548f439bb130f1ef9ab573ec5db6be4dca6b8f76fba88114ecf1365ada9925372e1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff9cb65164ea5883011adeede23c7818
SHA19ae8c770ffa58b58b3c0a21e37db7679c32c8619
SHA25644c3da02cce844f0d45d0fe3a3c180df78867d44626b1b75c40616dcdf10cada
SHA5127a107c312cf0ea99f7ad4642b2d8a88d318ebd3d5aec5eb33642dfee49b03795c5ab4ee1d7981ef28962aa2653d2e94a2322009b7c40043e1e6a39eda66850be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58a2153d62f10231428165b7bde6df81e
SHA1241d77617e5568434a464d84565986f2b0552261
SHA25677da39b336df2b1d8422af64c8bcc6e6c3d6c3c144915229ef58cee79ee1ed57
SHA51283598aeef7a648e33b10bbde29865ad0e6dfa59aa30018c5efc7589f4b66aad4e3ebd867b0557713af5b8f5161ceaa06243b779fc8f85c021a1b4a315b046d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512b761c0d056380851ec070e9ead1883
SHA1c9e746e1d90cae29204d14ee81de383eae7d34d9
SHA256f8925910a2f2dbedfd95a150941bbdc22bf2decf223efb2a902e4d395c47755c
SHA5125a630667fa547ee7baf38c0ad76e53ab134b8a8eec439823f342d13d7766536aa931b12e8a656b94892434f7049a96d2c6acd510b67443dbc6259394dfc0243c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53faa324b9417aa727f19aba146f54869
SHA13e5192c371074af7b508bf4c201ceb6da7db22aa
SHA25666d7d0ff7c952369690d49c8cfbe6e8eb1b3662a2db4240ddc860f71e089b52f
SHA51228285622ee9b1c9e64fa4ebbef66f9809e20a3752c8fdd154f5ad06186f1f8463735d2acfaaac3c3e51d04761b30a4b77798528211b47128c9ebd05c07598491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5314bd0fac863ea7683e87b37f8cdd245
SHA105a1f14b684ec0f92bccd2994afbff53df71dace
SHA256a330652856b54964f3f4e779e4428020b28d0f15d677edbde2bb03bf4538f901
SHA51290ed31ae15ee28bd8fe9a1324d1cd6ddf26d60ddf2824722ed7045b7e5c3e0e954bf27259d7b95a53587dd74bf8ce505950dad7463e46ccb55027fa86ef069d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c11c2345846f20540c5d9dc5be988f5
SHA16978708b2714b2beeb5f849b4f75b3c14dad7e2e
SHA256fd32dfbf51fcb1e2cee386d9ad11a9d65fc18bf8860fa71945986a078e235a3e
SHA5123f52253a7e8cdbf8752f75f752f3b24631332934b86384b807e7e29f10532bbd7533ff23df3d6867ef458cc8263e72fa2a41ef5002c937588769b99a2a387861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD545f5af94859a67c7bcd207fbdde7bedd
SHA1ca1e1fd665d8cb27c9057a7653f0767ab63e830d
SHA2567e03eb83d907c7ae6e529943cff8935e913554c2947ded697f02fd1cef71eb82
SHA512caec46016040e9e45c413f2ea034638334c57e8b555d42be57f805dcaa24d55ae04868c15353f0ce9afab7c1856b8f62dfb8b2b963c72d91e7828a85eb026855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54b3151b808a0af16bac8fade9b7a163a
SHA1e86a8e8dbffa65eab6f02cd584a97974e9ea1a11
SHA256a94573d8a8d45b64296395c603abce47881694ed91baebeba81dba1c342aa0a5
SHA51207afeab5524fe0186c48aa80ebc49e7e64fe1cb4bb0a9474226511d6b213e63b9ae89274f7f8ddc31f78dd85dbf3b1a1b13ee220dfe17764963550eeff8b925e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50bf48d3a4f0eb887c5a1fed825da48f2
SHA1f1a5e113bc3084695233caf155a557bca3840bdd
SHA256aa3c4e2cd04faab7a30d686989cf93b71844e92d622e72bc3d1d8f8471761a92
SHA512204336b3770865def0fb8469e5d59386c60a9eeda0cc18b6d6106e8224294efb679263ada5544f4b96c2bfdc4c280337875a313ec471c9a4924caccbc759ce61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e70814ca6c676f723db9e857efc4444c
SHA172c462c5f1ad83b7137f5b41a2d835d0d0a323e9
SHA25666ef81de1c773008425f23914848e60fcd8869f5b5034d5260d998d4ccd7cac3
SHA5127e2d853d78e7cdbe5c73ebc89b8374c7942f41d115bdf3fad7582053860fffe74efcc0d8536b86f427e55afcfa73f223cb8062d0d3646a16526b77ded46cb680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5702faafa4406ce141b46afb3c915a67d
SHA11f472f6c11e5ab977e68c4ffa061a44fe10e8c12
SHA2566390583716e3d54ba05415da52607c1b0258b11a9f3dc82a1daa5de4735dc3ce
SHA512ad5ac9822bb43b5d7051141037d42b383838412b064093feb60c8460f7b5a1d36b24dfe32430ea5d1a7da12ec5bee239ad1f2c0b2f208b0415c210a247f418f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5143e7b9bfec05c5f9614fb88ae76fe53
SHA1577ece842afd69e88dcafc2003bddbf801a5f501
SHA256d072a29e07f370bf94fe02e1b727c832f4fcc5209020180546c00cbd0d8cd7d3
SHA512cd3674821b7e74c98c6cfff004003e4dbac531d569bbc441ea482b7a2ea61253e12254ff518bd1be33aab355a6d9fa41e12cabefdfbe7955d2b313edd9afc2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59dfdfa357bb9ed162c2cb328c36587e1
SHA1cc273aaec771a15b8e0f44b13fda5faced481832
SHA256b5a9c90d9739ca84c6994a335768f71cfe0801ed7f00b003d6766065d759d1d2
SHA51203e89e3fdae600704fef15053348aa866d1452a15ec250a6e6eb05d1396b250fd59e7a6ef91d8a8ef3d8bf970ebbcf14e951a3da4600a96d1bbbc9e4c4905241
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b