Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
2ec3ee44e34160dd39427c78a8b00c7c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ec3ee44e34160dd39427c78a8b00c7c_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2ec3ee44e34160dd39427c78a8b00c7c_JaffaCakes118.html
-
Size
123KB
-
MD5
2ec3ee44e34160dd39427c78a8b00c7c
-
SHA1
80f88d414cc92cf4c1a8db1d21731bf3c1016342
-
SHA256
601eefc184fd6ac373aebe5c9f9e49dadeefc62e2194b752b573301510705c91
-
SHA512
7337646e609a1dbfcda5af2798c08af0518fbaaa82411c371b6b94065ec52b7127922c766d3dc1a5d5d869bec8226ff83157eea653e38f2d5bcc5670996090fc
-
SSDEEP
1536:ur6zjvqBHMCOKq4uLxErxpT/itTwgtbsvXZOZ/6W82:FqBHMCOKUGHI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003e9efa5f86f001a55455c64b7c5c16d4a9520494b85a1de67172ed8051acd5d7000000000e800000000200002000000082d1fadc19a8235fe140a4a026103147241afd547d795087f4ef3736a4b9238520000000de4be84bd74a17a4574a7102e53ebca5c4cff55fe2d4f15388d6836cdfa0580140000000a5cc3c6064ec15129582ddc465b5f686e13fef157f1f8b4fdae9e9e4769234b2119ff6fd2bbd423576375f1e9be39d56a3220c96d606366c7027d77c97717daa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{282261A1-3DCB-11EF-B190-DEC97E11E4FF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426674691" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604cf126d8d1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000051ce722cf5e5e28027ff8455d55aa74c9935c162819fbb3b19e61e6d5864220d000000000e8000000002000020000000eeef48aa1a07370266ca04d6848bb02c40aea7c9e0a956ebce7ce3160c3815c5900000000b77ab3f5c55d3bacae53024caa13427d039b3eac7fd706efe45714113ff91222f586df3331074c1d04630ff12e55b02cd4c975d75d8a4a386a185649bc36acdc8cdd53a7ce80b38f54c1b294540b758f44251931b64a3ab1e9a78319abe1607e90b3cc92f523779905fa6cd7ce3b2af43b9b3cc8ae246545fc025a327c1a0e5ad2dafef12e54b5001c56c95f6193090400000000b60e36a6d03977b4c4b8803fc4fc08685ddbac5430aadde1ca665b79d7a168cfa5261d5746b05839e881253f2b35d9017b9ccb2912337832416949d91d5ae64 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1172 iexplore.exe 1172 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 1044 1172 iexplore.exe 31 PID 1172 wrote to memory of 1044 1172 iexplore.exe 31 PID 1172 wrote to memory of 1044 1172 iexplore.exe 31 PID 1172 wrote to memory of 1044 1172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ec3ee44e34160dd39427c78a8b00c7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff9eae8ccc46945e7af6c1ef6a755a2a
SHA1d69b9f2f44146745c1b06aa66b28ee334bc549f3
SHA25688f8d709ac311a9a8adbaefb142c2e8af1149e4e9b5a89fa2e5b1141e3525c1d
SHA512968e7d21e25e794a105487da2c1829ed006fb5d391ea6654fdcc75fc5460404382324a07204586c21031810b55dc763b7aa1c9cb597adea5498cfc00cac730c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58864abc0831326a73e7b1d71e5a174f7
SHA1f9b6717347b502dec6c9ba7a4c0522aa890421ae
SHA256a46918ff75acf232a946703d1c593f81d341668aef4a9aae86da580cbf2ea4cf
SHA51238e9b55a50e1752dc8412a45b82005ba7ddf1f5ca85e17e7a648735b19c396e268e69b2fdf22a0dff9e7c6b12ad1375dce9faab28ccbf246676bb6998b3e483b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b5594a378bb49ad555a1ee621a6a0c4
SHA169df77630d1ab4132a2a972bea746aba551200db
SHA2561d097dff7dcadebf9bb5084c28a9bbbb0dc1274b0b85273a44030d97733663d8
SHA51290573444c7137c1926de3ca61c90f899846d8234ab261fcd132f4f8a50950faf246ce01cc3aed56fc01c0a25406575dce55f16f304e1b669d0cf1e0ab50260aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e317ffc9311e0b0086a10a7c8f9664
SHA1801df1dc1255792ae39968661c0d3e96e717c34e
SHA256ccbc3cb0ee3ef0a7357af1888b3842a81e393a6c59bdbc843bc3acb572a0cee7
SHA51282e46251748290ccdfd8aa797d2df438ccbc90bc7051f1669d94256ab07ea9e0a458ce9cab202ad751ba4b4c3256b741b6c38fbf085fb565e2ea0f43c8c27994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f320124f79f79388a9ee81b9faafef8
SHA1b150ea80ee7e8344ce73f09c3e5c85a6c3bbe7ef
SHA25620eae2e7b67c3b29e337109fd203d74757ac4c8bdf4b860fa1a446fb114636cb
SHA51222056a678ba5ba77b9739b2b51e8cb345c67f955f3275526b734907851b66e5db08a7af05d10eeca4d64ee7e177f8f09c996599f4332cd2e2a777fb4cc2fd9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc27d2031737406abcdefbdb38ce3916
SHA1f47aef809fea73a009bfd7fc3c7e631905bf6a55
SHA256fd0db0ba27fdda9f1be475647b9abc5ddee873df924c0d34e0b3bd835af5a9a1
SHA512e3d9aad3943ec4a624eab1b97f8272c3d17eb671efa6e3333eeef4f1386b970ec2728c9abaa0e6c0376a558a1cd33e65eb029c038ac7a062ab97aec7d2d91b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7ae7b80fce46823c10f692e2e1e2a8
SHA19716529dc5e15d55757830602e224595323d4a09
SHA256d12167a77f6e1b175059589f9f205211dde5c04655856323f33b4d07f862e330
SHA512d7ef236ced2d2ce9b893386d747588dae3ce91695ac98fd1363e9d36d0d95e84e067a3bd9ecb6ff8a227f955a1c25043c426ef6b2b29c5a4f8b481f68be40fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cad32e4333def761c6e83988c124623
SHA1a8e26d30ed22e24643cd7cb4cdc1692e8170047e
SHA256514f95a14a8b1411de81a8be23923f36e26b5a10d1b70e7b4b3ff7bb479af9d8
SHA5127def731af270c4693c597fdfcec3c9f186e4c4a2b4f667bacfce3eac582865efb946deefc71768bab347063af31d69c7bb72b100ed9d9b6b0900b7a96c773df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36728c6779d56031e97f0e7ea93783f
SHA19077fb634a30681f455c5dee59eed3d2ea553a79
SHA256a0b8274fbc4b5aa01fe14a64a7216c63dd3262c2b9e97ecefaded41e72d270b4
SHA512c8f48ac7b7eaf5bb3853d6415387bf4a459b5d46f29add658ec3ff8b080392318a98fdcffec5eb0837cf6f0fbf497bb0ed02771b8b907ec723e563c12ada5b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50443062047ec72ff0f49183f5479bfe3
SHA1644c84319cb31cf30e3e60b85fa24c2d51e2dcb8
SHA256248ace44afbdd3c2bcf7f682249cae374431025901ac77a314dc1efa064f24c9
SHA51231261eb5a4c2debbe069d65213db05f65cfd1b284e88215141625335225e68e0a9fc76abd5d0dd6bcd929f934ccec55c2f031d8680b6f28fb2c52d932608ce25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af4836c9894c77a2e5ba499d20c049f
SHA161c118d85e0fb1ed9d9d3d7f896b30455bcc69a7
SHA256d03910e92e7e9f324d93ec91e362b56be8743878849dd853e9c77d830456d37b
SHA512be53b47cfcc8c56df58162f871694890e689a28ad4b80faf26e72adf48b4b20f94f685f2ac4697431042154a732b5215ae3abf72e68bad55ac9fbee998cc7348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2c07a275fe18970f30e65cb436c445
SHA1074cec3149fdcd1a6fe292e327fdf8d1d860916d
SHA256d2f2791efe9daae0f6c635d6f77abf534e51302517a18bd0f08588fdd05e5988
SHA512e2477f69672beb6646a1e093de4e6c2a1d498a50c13562d2c0113629b40c7e95a5104102053fbecc2905e6b70b1babb1ba1d7ad4a50e49df364c172d3055e887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521213c810b904432f232fe2d7fd8e537
SHA15cde92ad282c9c749815b8cb9dfae73e7758d3f2
SHA256208e2509a38b2667e07c4a6bf4d01dd150e47040837104a3b45fd8c506d10be2
SHA5123d64da1bc11608d86065fbde6d446afcfb72ccc0a121d9ebf9d20a6d4db2cb547d03dacc54afeea0f53122da19e9594ccc33253b4a3716e4dcaf9d944c571c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474e90322a0be967099803d640e7b46c
SHA1c5d4c96eee85eb5f4333e138ef1aedf3d6f804a0
SHA25644b5577354b8635f3b0ca3e9c4ea6f1624bd1ef6863bacf45498d90f14d27064
SHA51246b1f483cd59656e913ca214cbc32c9d24c93fa055dc4f16f56eef9b8baf3782c5395a6903f749196e081057d40d1d3d01656d0af6c40cee0e8b7bba3d3c96ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ad02121dde456aed820524fe33b0f7
SHA17f8644c008286725b9b8289c956749ea8f6984bc
SHA256f8dcee46af52bdbf4a795a9177c31f7a55d238450a5d3bcb8741211831fcb880
SHA512bfe4aedcd0b2f3be01f9b35e04eddba1017b818da661c09e3be0e11fc025ecde622fb5154384fcf9cbdb7455f1a4ca82cbc52957e31b7f1fdbc7167b344eed09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb66807619d1c1ece940f6d9dcf17ca
SHA1ec0205937ac44c39b0a98b43fdc8793fb555a794
SHA2560c93c4d3197278875f01a33e73b62d70ebc99afef72c2963eb9042d4bc52e5f0
SHA512512702dde7447fdd7fc3c4c479c9078199992c87a19786181851d6498d2ea528bbbdb2a763778f266688c9b4ce46e2a8a4f9b06a45cd37e5ec5ad79b2da6b7d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5282f20c14111579d9d2cd1767ab76e81
SHA15881616536b68a4507555726dd0420e958ead720
SHA256be8593043d98104772ea4c55fdba1f97763b9aaced7e70a8db252ad760b5f268
SHA51209bc1998ec25c01824ddcc1d1654103ae4b4078318ffcc87c0baf2060ac2764fd14761b974f13c8f4d23f6ce616ae45056fa8fc97f78d5a8103d9c690a4bea0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5419402c89ddae322d4eab8c0cb4cb3ad
SHA148fd892e85e75fc766a6aed7bfcb75629835650e
SHA256cbb4d2d06b9a7cbffe463940021031b053b83b17dae416237a48ad2344160cea
SHA5128fe73aef01ba32d97cf3dac913f0205ff61bceef45f355bb48ecc50bee87aec44585940b5182da8a6082da072ee0f506d30b30a0f772c3424d82d33fd73ad529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f869849a880045df8fc6ad8c2dd4bbd
SHA18ca509a5632a725238ca408bf12ca6117bad9949
SHA256c8b9fd437ff5d59df8c9d491ae5e04cf4d1205d428905a07aab14feeae9ba089
SHA5120bfbec59dc496855980659cb102e2214664e4e37c30f5d97b34f336b144ce5d317ed6e8938406b6e915f085d10f5cdc1ed24f12f9ec181d779a694e3bd10d329
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b