Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
2e6d961e98c1a796c60921182d145daf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e6d961e98c1a796c60921182d145daf_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2e6d961e98c1a796c60921182d145daf_JaffaCakes118.html
-
Size
89B
-
MD5
2e6d961e98c1a796c60921182d145daf
-
SHA1
45ed6e37ddf614bc26cff6f3cb394b0294cf7f7c
-
SHA256
16dc1c5f048e833aed67ebee4188b15e3cf78868a181820db9f1516c9c9d05e9
-
SHA512
43b5cc1f9ab2d6c91ca56cc8de596c368beb6e33f10f0aef941d0157e6661723326e4f49a7fca9888ecca65e8405ae54183f8e29673c557125c3bfdb12157034
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426667775" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a651e2c7d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000004a2e4b475b68b650ef9362fe2170477785d5a9b3b13408f81e3120f4d22b5152000000000e800000000200002000000090d7f1a94546b1b61c852d15115dd08474066337ca74852f4db9e32c7d92ece52000000032e0d78349d8ffe2b2f0c7219efbca1b6afd06c59074bf8bd2d3bbcf21012fdf40000000f802cc41299d2fda6ff9d0c083e5b41ed53a9e501200c3dfba31c020105bc1a899ac7207308473196c4f4dd82e78fc7e5367004db1abf43287a5e81d29a08c81 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DDDD821-3DBB-11EF-BF89-E649859EC46C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2488 2092 iexplore.exe 30 PID 2092 wrote to memory of 2488 2092 iexplore.exe 30 PID 2092 wrote to memory of 2488 2092 iexplore.exe 30 PID 2092 wrote to memory of 2488 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e6d961e98c1a796c60921182d145daf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5959e7ea10b7a5979828228cf872ac1e4
SHA15218accd62e39ebc1dd149b2f1b6dffc64fe0a51
SHA2560aad9db146056a0d91c58e5b0d01529fe830b5a84e27aeae46045ea39b0bd372
SHA5120bf56a9f6941c425bfd911f32af69addd22fc4d27cf05a0b985902db0f6cf044bf07d94c17390ffd906871a48d89f709a9e0fc45a1e152721768fcc8f45896c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ec2e528c3336fa084bb75d5cfdf6368d
SHA137d504458463f0d6295cc57c8ec3cb6f182b5ba3
SHA2567fdf7dc1f70013829e97b6fa492b4ea0cdca3adbdccae01f5bf904873dcec960
SHA512bd224ac4cc311ebf0a4336173a163b69aba6b06b4d54c3ca25d44e8b465cfbd0b47e215f28006d9907f8ea9f64f7ce75eb58aa3652f05654e009b69dbef77cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d200d97673e4ef209a31dbbc4c98d4b
SHA1cb5bbe6cd42e5fefea01b45c7e1be9d504cbd50d
SHA25609ebf8c6b1f978d14355730e3aacf73b6101ca0b479e60d47f76590f9db2b36a
SHA512c9582e892e56dbfb9d3b80b4c85706606e0a6e6bda7bfeb752f06af8bd7d469005b19a2edd9fa6907a3d3642175dfd7018d2d78da266a3fbbf2f542637563bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5794311395fe7579a9213666d911e4705
SHA149aa27697b931a6911bc224e70d5d23414631b55
SHA2567f918dc311e4c11a1d29d8100d3d9acee09c669ac16ae7ee967eea4b84077885
SHA5122d1f57eaefe52a2dd68ced2763f666dca7fde03e0616cdfcc009f7d4d6c354d857764bb767f5b28fa59657098004fad02712ccc6388fa2b8e3ef84e8fcf982e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD532070429753945c05bd12c652c8a382c
SHA131ca7fa989a658475e0362b0f2dcb60f2e41fa5a
SHA256f25aa889d33e5bb85022678cc997589161b40fde2f8e8574710ab1fd6a26a02f
SHA5128df8f61d2681d4096f4d1ab6ef40f91e1ffb01bf25ba4b29a965975571f894a3ae659f176fe37d58869de345ff8694e4627e92d487fc4902b28e8fc7140a1a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a033630ef6b6905a2f56236bf070df0a
SHA104d6accc409b8c49ea6959fc46ebd8329b295167
SHA256bdd316308fb5c70757b669ffd7457c27cff02a8118625349f9dcbf6c403ccc47
SHA512f4c3afd09fd5ff6b5cc4ded02ac7d391dc4561c85d2f6ea0d1012d3464e00c02b8ff0a890fe54f102673768fec98f1b22064b3d7ea9bac89c5893cca1ad340c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52398f8ed4ae51d4a311c8c46e8115f1b
SHA11243f9b810ef3a1ec55441731616d394753d4554
SHA2569d97c1410144bbfd854af878f92f4fa8e57813c471650c5114756ca4cbfc0abe
SHA5125603749fc07db8646b22e006befb26d46c87a3b366fb886d0f0baac2318c92ed437785d8fa7ce37f01236cc6630442c16798aff2d3908be06c5935467afec1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b8734bda16b4a5fb1db5e7ff3c6fb62
SHA1025cc5d555cb035e713fb31123aadc44025db958
SHA256bfbd943af7f0e90d8968f3faf1c903698b789e3258b8492669fdd728734c02bc
SHA512d6828270ae95d1028acb546dedbe518d17839067719d652168d3e920de6d080ca8f6fc5e3300fd03f9468cb1f9c5ba98ece4cc846aeb8edf24183290458d822c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577f0892a48087e4804e893012ca8d362
SHA19b0b6f7eba78efd573fe7c53c75a456105599d81
SHA2566a666a4d282f7c891f6e46056c6f3ea8469d254b18bef40e06a9d948a2878c54
SHA512d05c24d27c1ea5b082689dea76d7728be45c2edf09d6553302d590f7cb78d74e09d1afc31bdab0a9452d3de43e3b4b50f83e2b6a7731996669efa335eee74302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52caa63a6b6f0df40e5d28844b758fa09
SHA132241c17d306e93733a5d4c6872dae2283d88a15
SHA25698826aea35c0e9c44c54b2286eb23c3f0a6b6c4e418d4a11ce95daef0e5a1e03
SHA51284e15f1719c1ecd14c384a97bc22117d60211a4d1d9273307f39fc648d740354af3752ac205c6deb1853106820078cb04ed553fad6bb12272e328bf0054ad6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ee2148ceec973ff0ffe8f63cb39ddfcc
SHA13e5fe79669a7a5cf1373d8b5db2e14ee6869bc8a
SHA256e5d157de284648033f94e612fb3147c3d18a57e9302a4512ebc9da823511dd91
SHA51296bffb972019ea03715a3e036a04308cb0b20c3ebfd9ecf95b632b835dc95a1aa5ac4d11da3309cdfc98fcf3adc235f4fc9b3a1ad3cead413554eec4a96ce3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5825094a2deff903ce9b2d8104da6d264
SHA17de14680ff8fd7feba4a4b653f3fe11138552559
SHA25681f5ad94d571edfe5d526630abc87a5ccdb6bea3f6eb78f4f15ec1694edf430c
SHA5129c0b57a4f3a01ec629fcfba28bb330a2fc273a883a8550df6490e76ff20f47f61eb533e03b1540df6a6d90d0ce1a0688b91424e28173b9bdccbbabb734c9e60b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52c996a3cda644c08dfd610cf7f785d47
SHA15d808fd8358a17e1371eb751b3b380a9650e1e4c
SHA2563d6b304f355135be2a1602f0613d6be02d7f249c48a08f970fea62aff81dd569
SHA512ff7084b7e88dc5b553dd6a3d34dd7221fbfadc5354cf603691340c115c71c3a154e87050583341252abec2091d2183d0d19169bd4782c286f09b793074210001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d95b547ccd5adf11edb388ddf1049e0d
SHA1d8cffddf949f89d385082fd3e3d69ac1c7e7754f
SHA25666e5b7ee7a0dfec56ec0c9189ab1f80185f8b526a3f3d21712068cf4b427359e
SHA512823c8edaaaf501fbb5cab5696ab8fb6628379831a5eb1dbff0d4dc8bedc22b2d77007395bb2e66f3b609f9aac0d84c5b0001ab1206cd5b165555bdc85d87c5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff1605e4daeeb077c0cdffe8b97e3906
SHA1647c8be37a20a90c8d08bfa8b42ed20b266ccd5c
SHA2562b7089d49a4bd494ce10203cda295c42e4547a657cdc0b5c22be98a75a09b5be
SHA512aa15d5121d019020354b42a39eedee80c9df49d80edd0eec0050b1d7ac5e9847f33c8fec3530e39a7583023dc00049ec1cfc96f0947fae8856f873391b27b268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5007da65fb06d6089867b9c4250b34aad
SHA1f4d130013d2b976ac49a5905ecb5f2333241f910
SHA256e4354b8da5cc006318102e3e8330fce8ae3c1591926a6786d990999c74a89781
SHA512f8044d85493162aa5f7def95c574c794b5290e90fa1b8fc631305b0f9ed621754537f32f3c8e330af0a48eec6cecefaa6bb7921dfa851b325aea93eff7c473a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b6690a6b28a195a4f9620437b3b30f2
SHA1a834225410c3b03d7a0667f58937679a674e14f7
SHA256f9f84f3cd19242ba91898056e7474920a0f608289c8638aa6eebbcd66e0dc2bd
SHA512e59ebb58f4a795555ab9550900d0936252310061e560e1772dbe21fffb2d690e20188083e37cb49df305aa9543280466f01ad5b91e4b4c91a1c5d2846e4fcaa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b89f2a2836531c09aa3fcda57ac4f89a
SHA190825deeb76702b40b8e46959004c72e73c6d5a5
SHA2568dc86dfe86db338ac879539aa7410735324a881e81dab0f18d3ae784c50aa72f
SHA5122501195873a08bd7b365b1028a7400392f23555bc696e3c2d23c82d0a75b1ba60f263acf05b13ea2fea31076568a56feb238de3361059deef70b74f82e57e98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5462f68f6d161e51200c2e9ad3e983cf2
SHA1501c3c35362c3a2e54708dbc387ed6941d6a5455
SHA256d226bbd3065d8d8e6c7e976b344c393fe714839c50f712a3b00f3cb1c26dd1ae
SHA5123e69669ef42d575b83b1b7b58d3a55d52948daf0e36e93a7100decbe239e03c7951d61faa8cfc9c2eaebbf2d946b7f9990e007cd4fea9deeef5ff7666d3c623f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59676abf1dd480a25c7e7a7b519b5b8ea
SHA1e3ea998b77718c9597473f4593d836ace965ba78
SHA256a7f792a433e5d36725120c810456d4293c82564191c2e01f3a4a98955fa0c669
SHA51262f394c01be2f5bafa42c737cdde3c068fcca2997bef1eaec617885f4704742a5b36cef33a2e4bd1d6bf8924eb5d45c310cdd8a85d20ae024bc927fd842ca65a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b