Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
2eba715463a1cc1ff65dbe8a00fe1b12_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2eba715463a1cc1ff65dbe8a00fe1b12_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2eba715463a1cc1ff65dbe8a00fe1b12_JaffaCakes118.html
-
Size
53KB
-
MD5
2eba715463a1cc1ff65dbe8a00fe1b12
-
SHA1
2dc390196632e7e8b36aaf290ac8bf176e7d5b7f
-
SHA256
597566536ed822a5a615b59929dc44297a1befddcb4eb1474755579d047afcff
-
SHA512
b782a5ab21020606aece973e11ef7a2dcb4ee34ab613809eaf3f4998a86d1c17f491cf91eb5487238939a89751a42fddc43e9173ae8fdee1cc4fe658ef395f71
-
SSDEEP
1536:CkgUiIakTqGivi+PyUGrunlYB63Nj+q5VyvR0w2AzTICbbXoq/t9M/dNwIUTDmDc:CkgUiIakTqGivi+PyUGrunlYB63Nj+q0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802b9781d8d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000009d98455ea15f4e98035029443aad0f734ae5f388345b5ad9d48c4db70017f2ac000000000e80000000020000200000008cfa3596b45e70f80629a486024d1d985ad45d1245e3b1a5ffc14997bf63fb9920000000443e6e86d8125e78d63f66c65494b4bbb69a970a5b783d98830bccc70761a63d400000001aeb68c2103817d4991a663c83fe028060f5761970ff76ac959c6c0d23481546036d38a6b90672e1394d7b31f4cc95d4480b939bdd52618d2d22240ecedd279c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AAB21661-3DCB-11EF-AB0C-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426674909" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2508 2392 iexplore.exe 30 PID 2392 wrote to memory of 2508 2392 iexplore.exe 30 PID 2392 wrote to memory of 2508 2392 iexplore.exe 30 PID 2392 wrote to memory of 2508 2392 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2eba715463a1cc1ff65dbe8a00fe1b12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd6694b9a5c72dd7686e9e9f2292db73
SHA1a5e2a77e723a3248b2dd963c22c130f9865b2fdb
SHA2560b4a24647268339fdc3372b2e0f856206c80a2f2637163540385f5463a139cef
SHA51282a07bb877b77c6620d0fcbffe55be13483375c6a10db5a45ddd9f4258ef8b293e0fc87487637566e023b03280b5c19384005feb584ae25d4b1b99da5105402f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944dafff311498062689947601d2eaff
SHA129c245641a97f8d75433048c1d06a68ea0f23b7e
SHA256fd3c90d7a90720f709f3d90f67721a0e8c840c532b5c4d8d3d0acd8371985ef6
SHA5128acc35853ba7cce9fc35cace1847b5f80d226ecb9d347b5ed121075311e4f13c8a6eff04806db5fa646bb98049a26cb50cd1e33cadc37139c4d5ad698d9d33ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597ffcd6e1e2ddf0b6ec0ba505d3ac76
SHA163e7730be9c912abadab3eee45587e49db5c3d98
SHA256ba6d71d25a8bb931d9b84d36276e9c5fb10b72e7c552c2f917643abfa9c67cdb
SHA5121db3eedc8f175d9f9399ccec382d78cd2ed928f6ca2e89c86acbaa0429b3b4aadc274f5f66300cf46c22a20b2724822ed036f1e4c4fa1bf7ce93e88a8401cff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e688a07150121eeafe18a0f91d542996
SHA159cd4fc5e43cbae1a00b15144baad6b11364f583
SHA2569db6c4244dd299f541b63968bc13bafab49500c47be853e84de0d062edeccd49
SHA51264d005111356bb10dd79323434a8273de4497ceac5e5025bd430c3ad573e9d5944d330b7b831155ee2fd0a10c78c42f76a8cddb584a0ef5fa76eb943af7d72ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3ed916226e1dc71b1c74b8bc8cdd81
SHA157b4e62e5df0351cb30d8691fb89a0d4405f011b
SHA256f2fb170d4a587386f151ed6c09cde51910da6cc1492b153f6a5fe2cdb4f1bf59
SHA5121098541659f77acb953e50b9b0cfa10df37d12fa74970fd6b79811f5415407aeb7ccbac9ed9823dbd8b2cf1d415b1225bd37e06f93982f29e3436d443c3f2ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38493570f3cd5dcf068d971dffc6994
SHA1fe5a5269388d287cc1acc5ad0197992c5879a8a0
SHA256e76a9857431597fcdaa0b5d33d3f06147bacecec9eeb344bdb5a1194c7293d7d
SHA512f003159db334d36523bfa94cfa77238efa399e98fa3bcd38b259b8a25b0c1d4a35da47619a636e610821df7522b60aceec5acaf38b48fb9b8f89d149758d9cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d34019e1dfc654988de8a962438ae0
SHA17a588128947791ae323740470bfca4f13a43461c
SHA2563aac8b1d983666223d0b3fab7dadb08bbcaf6069a4c610969af2a2b1721bd514
SHA512665216bfc0c06f4e520876de3f99e9894c6b7f35046dff3d0af4a457c82ce50374ac89c52bd6dab77bfe4c37e8bd20ca9898d0346bb76f2e2652753669f46f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a65c81e940bb1b7cdc71d1ac84046dda
SHA1132ad87a22e54f061104ae3f145ef9574c55b784
SHA256aa7970e254dc539470bd28a68b8596d635d3c017e7c16b8281dcc339940f8b17
SHA512a8aebc214cccd5a683b4d8462792b5c2ea0361687100307c9f9852425e411178047498f822b3c18abe78a904471aa38a84cfc49d46a50c7f806cacffe6840882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f6689fb3a17eabe5964553bb41a831
SHA19cca81c76f65d62753b4a2cd3314c938564e8873
SHA25642d3b3b9020164594c2ef54b5519cf5e4a0ed96a853e4ae241270b1f8a99d371
SHA512ddb3e7ece6cc5afdb3ba8eb411cfd3dd2a7d52951087ba63f85fb84943f4e1b907f2963aaf1115f1035604f511f9668b7f480e0d33fc02fb703ad34c3afffbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf66359a236be5d2476b8e21e7de6dd
SHA1dd4dc74b4729dec36d97d4c2ff9d37cbf4db720a
SHA256a62785fe9422507c3d1a2183415a5390f4022c0ac08cf713efe1684a2c5e03e2
SHA512dffd5c7370914e3d9cfd972a1b04ea8dcb615c0fa3f84928c7ebf6e096a60a933cd1100e4dd7f789b40f4151d97f4b0d3b8a50144dbf838cd199a03a4ed69e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da4c51a640dcce5c827a09665364cba
SHA12fb3935c4429102442acf48eeb0ea1354dd2f555
SHA25675231c574cf0c2ce7a042902de2f23abe0b74149cab6f04604fa461bd5c3ae86
SHA5120c03601c90ea332cf3fbda6dfdf4c80c45bfcbaf4ca94f970172e4b0da31dae7ea4ccf9fef024088d81217cb972491e59dcf2e10f3ff1309f79fbbc5630bedfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c10cc2ae0b93e6524f8bc6c1412ce40
SHA1896a2ff4bc0e271df379589b8c2f3190ec26db44
SHA2561535dd02f54f0625337103aa30de57dbe977a5149ca832848ee9c8c5d31346f1
SHA512b5d05307b29750c9d1d3ef4b9df5158cbac692f19a15d8aa156af5bd42060305f5399cf92f5ddf90f1b7071033e0716a622cda1cb5583a776910c969a8cef7f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e451c64ac80265bcc266e1de5b90f3
SHA128d3bdc8b9a03a8e476b929035c370279d2468e8
SHA256553f092047a180b922fe873e93a29e91e719e5c26ffa64b4020d26d166f67a1f
SHA512e19ae957ef95e0b22a889abff356225a3809bfd8b4198d2529e4c627662bed4ec9ed67ebb1b8574d5c4f3471af14d8d061b2dda097609a27b4e05c28c1402946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6456019bb06d7828fcd34d24bf105d
SHA1e677136868ba31b3898fe1854f9fc7ae64f541c9
SHA256da2ca3c7c1aebc97004246a96794efe0bdaaa5a939a9fdd478b02a0218acac51
SHA51292ef0d3fe90ec07df646545f3247672791085f8e8f2f0e7ccb61a9727109c6f766f6baf71e00d8017d58ff67e77cf5645ad1aa74d5900313768d5ae99490dbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576b96703e7ef214b1a0fa29dad6c36c
SHA121402fca05153bc500d06a0500bae4fe8b66e822
SHA25648905d3e3948c3b4483c9138937c89192f87bb46d5eeddcf198ec5e2dc0117b5
SHA512a49e47afa09589cf9de2513ce5e220ec58dda43b216940d4ac9172e55cab731f63bfdd018373e47bdac9cdbb1958264f092e11bc8c5362410991a4ff997f0139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a189c2a8c3afd0c986fabf665f970447
SHA16e5a68e4d46980b9b683f1e573b5dc9e911b88bb
SHA256ea2b111ffe7ec462d4c33b17c99fb5ca2b4c9c116ff24f3b4a781b7616f755b6
SHA51228ae9725f5cb7045f57be863d64cbbaa7fc7947e1c9eecde098361a3364407636699194d00f0355dca1a91cdd696a10a8e99c6a8e8db0f74059c4c8fac503aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c297cbad4c5d2fd65bdb184c60edc612
SHA1107920d430eb6f55da9426c9ec9a60e9e6505edd
SHA2563f202df355e8d5069acbf64f45c2ccacb134aa99edd98e292468dfa10f270e58
SHA5124e0f8744f292a704417b0602f69dffd579a015844f689093e25daa0e7fdee416d435c621a2b8ed32634900abe50ab65dca302dddd35294693147eee04a6db8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341f34ad5ca45df938c0f0b1213f466f
SHA1896998dbbd14c355b88eae42f929e25c84bf6062
SHA25600c8368351027f20266f517c3d8776a23dfd742c46b021d0b42b8db12497cdb3
SHA5120691af34f02e90cde6890ef5b63f9f17a6f5fca2a70f8952a613f933d4b31e1188ccdd0b11583ff4ad55e108a2176d211fe58a6cadfeaf66a86a0b3c5c2513b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d0f6a5d98f46baa3c1695270539597
SHA17721034d42a30432d64819d0d951cfaead77124f
SHA2569aa7bc2a2c2b0ebf5cda7eceb75223c841f1ea854303bedc6d75e085552b0336
SHA51241466e3d21cb921acbadd3dbc32962e325acb12e7fc3aea7c6156a88a0dfe95d9eb7d0207f80a417791fb27c9a33c7ae014d4aae5d52c4076df487709a1fd6a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GA43GQEJ\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b