Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
2ec93264d054c9f233589a96e17ff5bf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ec93264d054c9f233589a96e17ff5bf_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2ec93264d054c9f233589a96e17ff5bf_JaffaCakes118.html
-
Size
6KB
-
MD5
2ec93264d054c9f233589a96e17ff5bf
-
SHA1
fa1876e81543c1c8d1530a90c25f1bc5084f68f3
-
SHA256
cbf7b191a7f2ef40f5b2da05e9078f55bd80960274c5c71c26fbc072d9bffefe
-
SHA512
c4e712725fe20abfda44e11f7fff67c0475525b0fd3aa5e353d9722b3fc4366a5cd53f78858136548d2370f48d236786ba3ab8cfb3acea2bd731319b5d189133
-
SSDEEP
96:uzVs+ux7FOLLY1k9o84d12ef7CSTURjkcEZ7ru7f:csz7FOAYS/tb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701879b1dad1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9BAC9F1-3DCD-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000058974ab3a6cd63be138cb06968df0303d75e2da29e36a822d2fb290510e06506000000000e80000000020000200000007ef386d669a3feb480481d655a67a92f9220bc536cf86969891729e6588ceeb420000000c39c03e45d083637da4687114255f114a647064a5002b5bda57726993ff3ccc340000000e7144807449c769d3c42954bf96b601b6eb655021d6b5d3b36bd1f39da0870739c45724802a55932b462da16dc9c1ffb4b433c6b7c31bd877d74e14586af6db0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426675848" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2820 2440 iexplore.exe 31 PID 2440 wrote to memory of 2820 2440 iexplore.exe 31 PID 2440 wrote to memory of 2820 2440 iexplore.exe 31 PID 2440 wrote to memory of 2820 2440 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ec93264d054c9f233589a96e17ff5bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5685c325b5d14a648ae79cf342ca769
SHA1c3103e9df6455ce73178e84511126f089d5f28db
SHA25669924c109cd054e7e265e6f835365fbfc47a9dae0fa03e0187a1e97329c1809c
SHA5129de9605cbc83b3ba4a37c70384c22c0b4768962767557bdfe262bb444e9d2575a2f1f6cc2e900e37f931e026ede7e20812a2f642712bc639edd1e7e131416511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e99b61bf1cb339dd015eeeeda3bf57a
SHA1e865262d9d50f64b1aa76ff466ee0226f743fc1d
SHA256a40f02c50f0396a9cbdaf8f76a54384f676bfb2bd901b6bbe9cc4b6ae3ea77f2
SHA5127f2a25c8f07130046dd375d65cfc095842cb619a71acdc35b9fca328f3dcb5c7a31ec16c626e600261b3a11285401e7bdbf2de3e9e3b29ab83db5621ff41e262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef8e8d1c1275033b51aa82b51b312fa
SHA169b3d39b2ba42fe9ad279e30d6daf1b6c6f4f1aa
SHA2567d352c78485c30f3ab216c8a2515a1ff5af618605c393f74e417a1c0105fe67e
SHA512685c747ab1c203c2257ba63fa496f1179dc2d643b55c6efca8a483cc5508e57f25de4a93f39d227df2b3fe5132b462eab2593c2b195f977abee779e6f2171918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa16c91c8595731a90e8158d51085d8
SHA1abf25daef955c4fbee7543e6e98b95e3da82c4cd
SHA256e0208e074cc066ea4c297a20bdb07347fe030a9684ba9d6afc65187e63e247ca
SHA51200ee859e55440be8c2342c5ee1b1b2e6d02eb9341953a34ac6998848230ebe3772974a02446ad470ca7252ae7fc07678477b4b4147efd4cc7d93d62597d08f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db68d289dec25795946d76226e571db
SHA1317532366b9fe33317bc7d6eb1311bcc604cec91
SHA2567597368fe998f6a97fa190ac9669da64f4d3ff31167677835ba5667b547c0ba6
SHA5126d83b4752d46e483e75431f0090ebd5ba5da2ec7fe642f254382a6522d531a94854966ec7391963383396b4a15687e3996f740d332a87c985fabecb016a33451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22377e2c1d2d4d1917e0d71fbae50a4
SHA1bbe7a5a42a1c9f1e3cb7126bbfa2ed151f5f8e04
SHA25628d14713b7327b0daed7d9b3eff3b906d8a541f5561e8d33d10fbfc1daaf6936
SHA512b3dce643f190440841bdf1cca3c1cb800f62bcf00865c501de6308a57697e70885e8860e3255fa7add84e753ac5b576390ac2e2778a3f14a4f16d785234af392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84084debf92c9f1a48120745baa8e74
SHA16450c8cba008b0b02d85a1af0f404b8188897040
SHA2562b7ca8c739050f01219891825b9168d7154dad83898d1928f59d7990761b1d6e
SHA5123652591d12af438846d83334dee6e033414da50c43601cd95b222b23ed18eaf5e2d0730b474942b006e022e860e6e0dda1e69b1bb3b4886662c040ee71a6b076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52273eba51b4c14776b0feba958f7636a
SHA173d5c1b17e2e0e16e3d81fdfe4effda1bfb894a4
SHA256c1211d0e7aa9052752489dc230bacc67b0ac3366cc082c40a552566573fc4824
SHA512c93eabe07091b9d86c3917b51df39c26c45d442a6d5253fb4d6eb6f59c07dc1b09d2cb36d7df8e0210cdbc737cd3341c96c8b8daa71037c978a9fcb1fbfaaab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3efce6c9dd0096ae19ea80280c1f55
SHA169d3df5de814712f77f1fc58eac78d1a7c80b3ad
SHA25631cb4dcdf64b2762b5477fc9b637f619bc168a28421a69cb3d09c09b14e28ab5
SHA512ed6ce3b943f3289660b0e2fe806572eb792d2fc45dcebf4d7fc6759f5a80b9bdcb4e196813a0ed1cd1131c20f04d61496eb20d540884da43359a8fe72e941669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccad3d70e2ee1f634c2e5f442273dd12
SHA1500531e2bd665e316f75cb1731e1dde172e0cace
SHA25609818017768ee7d19add129137c87ebd36da218f1fc0aaf2455fba49ed81af2c
SHA512f841afe7e6fb2e2181d093c27d28581b8096e70bf189133707e1f662d3c9ab0f84ae99dcc7f01d9c6203f2ff541da44e8c22118330a29a7bbfb5d41735868d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f9be98d14ed4fbe39ea7f880e65a114
SHA1e2077d91552f508996af613b618a5877e5397bf3
SHA256ef1257ed15c4332959db25536fec5056f9f2ca7f91c9174c02140e7bcadc16a4
SHA51200323b45348b809520b6eff6519f2d8c5b17b195368065262ffd4deb6c52c9f1fc3cad2b483c5409507fdca4a6d3bd3484a88cadc28d7bd4d3b76eaf01591015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc4033ebcd40ec226b1fec0b1adba543
SHA1a02844a17c5a5d2ecb602ccd750d2332f4ba755a
SHA256846b3a44fb203cba0fcb95fa6075bd568c8f4fe410a6c8a86675127e595549d4
SHA512b2637aab31ddf0b42bbdddd353c5cc54427e4d504629bdf581f85311c21e4ef6ef6f28d8ddb70801b8ad98faa344252377eed2fc67073738bcc28c51642c63b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52705b8e61674f624aae3aff06bfa0c06
SHA16b1e1afcb6f3050ce4ebf0bfebad1a14b6921cc6
SHA2564099655e1b18ed1e439ef644b191481555f195fa3360958102eb7c27ddcc3f3e
SHA512bb9fa28f896cf2b86e218c4bcd589c62829d2b413a559f6b4d15c8da06678d8fbfca4ee1a6cc3a5fae24725eaede08c2bd95f7eb0c43d1b357a55b50e888f3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a23797cb4204d6953dc8da9edcca329
SHA1f2b977a7f954e5d204a5ed96515e0214c14da0b7
SHA256c334971f69e9e2cb18c43a7b84121bbd3083b8f2bed8f1a480583f45deb7bf2c
SHA51298086d028710a6873daaffcf31c1b3e908a9997d34b95cb812ddae9d01e46f9f8fde20b2ff16693bc0382c9de67ccc96d401839b5d3985413bb627cfaff34a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595dce69f9f8cdbda7fe957e8bb495a21
SHA1b7a3fc232e008e3e021cc66b57ff06986d774790
SHA2568c72d541a3964f29fdda1be5ccd3a7a629e9ccd192c18412243ef7565750f179
SHA5121f5b4a20922c4ab4652e825d7706115c11037ad8075b9d66f5d429f298ffde58a6528de39bcf49ee49d28176486aa28a9a4d0eb3341e1d38c4683059d0f5899d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc9f4ca12617427d4751201f54b9cf0
SHA1ba48b5a5c227d3f3e8e962662cc0ed006c0eb415
SHA25655cd36a7cecf18bf89c76299e1df9d846d0fb6d5dec038c4c2eec0935fba4e89
SHA5126d21d38a1768908ac26bf709e9b58f3a9fd62712b064f5b9c88864253343d8019dc4eface1862496c76062082d799e5ab1490cfddd5a77c399dbb22e7cce8ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53137a70c3b810976da0be84817f68e3e
SHA124b546ce3de9cacf91d93a6f765a05160208344f
SHA256d46ca70008f8350f6bf33afc2695f16b770f7f618ae57b6432ce6c2b5bd20bab
SHA512b45c3b1bcafee656c32e2da1cfcf10a8cfd2cf246e62f92cd516ad85032f489ed7a86f2eed7cbbcdc623cc05a30af433f9f9c60328af10341fa1e2e8cd5be400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a3d5a38dd0678c3c9a6a1c12bf4ffa
SHA176236ac6fd65f557cf4525adc0eb22e656fce12b
SHA256b7a21559564119848226711b59d5e0114b364626b234eb40aff027df46e50aa2
SHA512416b332ad83b3e2274a9b1985fc040e9c227d9b4f893681abe455c963e2613a30a2a7c1a9b45124ce6b864e486688c0c464b6721474c8e043406ef341c9ef54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af976d131635d5e272c84f5eb365229
SHA158a7a6e36d2d8c72c73d8aef945abcb2b8334055
SHA256198675ce64e0baa40de630842f1fff040aae162e8dc6f50783cf5de027eb99c7
SHA512fc689ab36ba9309ce62450b2f80e8c781c93ab7516f01082ee17f00c2cfa609f6cd0edab5e0191faf0a37437bc0b6f0a8435e97766d569faac8df580ae0c26a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b92d29e07ca9cd020bb02a95670909a
SHA1cd46783ad121aa18c156580e038175ac9c5614d9
SHA256234f0dddfbdd3ecfd468599e2e7641fdb09a8c646a9fc44cbd87a97bc0688f41
SHA5126926682cad27dbd1d14c3497169702711e2010813b23e384f7836bbfc8ff627161eb8f6131c80b8f4cea2f1084420970c5394a3520fb1c9e88f6720a4e9694d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b