Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
2f1467afb53af3b33732d879bd581db0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2f1467afb53af3b33732d879bd581db0_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2f1467afb53af3b33732d879bd581db0_JaffaCakes118.html
-
Size
121KB
-
MD5
2f1467afb53af3b33732d879bd581db0
-
SHA1
5d4c8bce0c2a194ea4623853d070fa724a915b3f
-
SHA256
60e43a122745f25be1b7efe98b0e1e136d58d5a1d41e1008f059755b1097bfd7
-
SHA512
d7305977b011c080f5d53284d4c7d74f2a94421918926691c2c71d2ef129592784c32a7e4f9621e4f6859a66fab6c2108141227c3910b1e68d7061cb44bac6db
-
SSDEEP
1536:Zjw7YCn/88xmx93QLymrSc5wXwGgmxiKV:NCE13Vk5wXwcP
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000015fbe986b2f8b2ece7031cb82117b3bed8470e2193881d10174348a498cfaf69000000000e80000000020000200000006dcee37b22212cd76db72bc8930d471c5d5c365751b7d6d155b9b2f72a7d10ba20000000703f9e840b0077a962cb8d9fcd1a6d177de976091a42c260a1ae3d1a457ad626400000007ecf32ce526a4297daf2dde4b69aeaed67c95375d0f0a0221240a8de6dfa62934b70ac874d28e75a266dd08025d80918d398382c0afcd57b405d7246f9e46571 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426679991" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0353b61e4d1da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FC95291-3DD7-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2784 2364 iexplore.exe 30 PID 2364 wrote to memory of 2784 2364 iexplore.exe 30 PID 2364 wrote to memory of 2784 2364 iexplore.exe 30 PID 2364 wrote to memory of 2784 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f1467afb53af3b33732d879bd581db0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ed9124ecde906dee776fa21395e30a
SHA151b39cccbe6ac0616f729bf60464f55f908cc29e
SHA256ca22d0428327f0403cc540692e6ede207713644aeb8d9b4013312cff710b4925
SHA512da0c3ad63814928c6bc82d5f142ee29201aad18b4bb13ad4eb51f7388f7de2e86ebfc0982c316357326b96a961ecf5af316616f6af203b6d47ac792e21245974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbdc7c8986d17ddd4727b5e73e569761
SHA15c0889b607db62b0900cc663515448d1ed24a7b5
SHA25636ee07b36819f20e31e74c61ab4bb535bbfc40afc966d0176ea61ce0428bf2c6
SHA512e0b6b149d523ed0837c118c23db89de37658a81a5ec2e5228af299d7e01396b58048d2389151e943f3a1ea431443670523c757d79d0534584ce22a904ada8dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f5091552b9330e32d87d38b74f23ac
SHA174b011ecdaf905db9dc0dc4da5d72cdebd0b9def
SHA2565cde847a2aebec24c1a62d08f973388ec2040dba5d7fd1a81a0c99935de9f322
SHA5120aed59d572d0ba67e9d33ee102749b865061e46619a419dfd765ef05f0a08e3cfd2157ff05ecbaa863ea95e17fc05db3862ecd3004fadaf28e35a0e8e2a2d660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566cbd11f6fba70cdd37def522bbc0bf5
SHA164e8cf9ae06bfdaa92faa3b30f262d85a4c29471
SHA2569be71eaa027ec7c97e18144ed8ca3e921ad056ecea29aa9b164c7c38ff07ba2f
SHA512a9e19d07498320e211dce4e2e7d0321dc3b262a08b82847d273516d83e011dcf0d26b71555e0117668f38013715875a31f0e617462bbede0b00c8a46b5f071bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b45c4ef69cfe8aef7d7372610a11483
SHA11871d742ce4d779f53db81f4daeba147a69c4e91
SHA2561a35437d13061e57ef229b32acda564960229fec398709034c36f1629b0f7d1b
SHA512428ec9ba1a22774bf5a6e8fc6e9651947f29036dd4a0e41d5438b8023c2dbe444d15d37ec36a02c4ea5efa5bbe8c09ce336f7f4c9edc6d8284b244c863142a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e1d5775015e44dea9ed0143de024fcd
SHA17e983e5c6eb78212a0942f7ce0cb9a8fb921254e
SHA2568973c42896f48e81bc66a32eb4f9f2bac0c0d0aee881e9b49b8be4dba171fbbf
SHA512534c57377b9e2665901c83c0745da2240c6421487410afbe13cdc3f3530285f05b295b4551afc805481530260bc210a00a9a931d80f761990875ea609ad08552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ab3c1f49b8e51f79408f2357e36563
SHA1b3777dc9139b210a9013b09bba79fff7b72abf9a
SHA256ce5b296d997367e0ce17283705679b9502c296c874aa100797a2ed54e1ebc2f5
SHA5126be8f9a8f17be59f3d1713e1089ced87f244341d3406c0c2daa60922a7ad462e40be9744f369fa00f592916fe11ff9aebddfab31ecf6e09b461d0034b696a493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35da65b6739ec6942c6747df4a5b26e
SHA1ef90211dad1ebda97c1bd57ba510d01ecbe4094c
SHA25699869a68b160f4d6f79f02bff2883804a960959760a557b9300eada462f11f47
SHA512d00e7bbafd4aa3af763cea8019eb74e9f3e226ce892d29fa5129323343b49e6d936e4914e711cfea2f41e3706eca4da75b6bcbe156adc207d2824da49e4c8862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3873745c9c4edf1a6ddc31986b09297
SHA16df9529db57be7f19a4cbf2b740f2764df94447d
SHA2564e166f66ca65200c37f0d7eb0615ab1a8645c1f4987b282a8e4c47afce71d387
SHA5126750e888df3df6d3ff696d630eac395a0d417f4b3bd87df4fd8cffbe9545e55b9d25af860aa65fd9b2bf205b910104bdb95d597d4cc147d50823da951a07f235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a8d7321f3a3eb6e3b80c3a35886fa6
SHA1b7899ec46ee61cd15c15bceaff05d5a76eaa6c9c
SHA256842eca77ba4ba498d51460b2154a0293069fd0e8f69b441c42a1a55e63e2f23d
SHA5127e470e0f71f645d21a5754f8f76b27d3059ba352c54013d82b0825adf84547069269f61b8d71f0fc6f1cd4561a4a244ae7b220116c93a4245beda8c150347744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e9129f0011301ab2bf4dfd35d4e8b1
SHA1d6396fedf28f575b3068a7b42e43d189de07d614
SHA256a136bcb0cee50ad01b0d5f24ad199f3d11efe87d5e6bea4172f8a5946378bf07
SHA512f5343a40f7583969223e5173e6ac1c73071b3b043a0dbd54105d1acc26605cd5e16cacc454d8f6d524f70c65416bb72e2c602d7f7a84f212532328d9b10f4547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa44966223f6b706a40b436acea8c6e
SHA1ca464ed4f0556b7c6ef6a808b14edb072cd71ece
SHA2565eb66356a82179361ccdaafbf91dcefb1d8aa874ec7800e998b6a5d3b0b28aa4
SHA512fd7350ce41de0056ad7ec5d055b7463a603e1e23129a2f46068c93314532efdc44e7919706041e5e23e7490e7d303ed9c2e0955d5810bf1d79351719946c615a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58202dc2b970657a93682e6a568ec8ba4
SHA177569c8a4979efb87728862b115ca048e39e800b
SHA2561ff6b63a0f5dad1b43ac5f9adc6e4007ea4a3d31d46df9c08b0c5d9252bed3ed
SHA512f3bcc63ed0b7560462c1630ae1306774f684fb24409751ab472a75ad13965a550553edd1f1333d433b52d8432ca63c084603baeacb57331d469d8e3a9cb43d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a209776dd5c986b45bc45543c7ab72e
SHA191529bf4589ec6768d83fe2b6c8b40bb5036264f
SHA2562f04083285e650e488d4c1330912f2c0054273c9e210fa7a74ea16517d472c65
SHA5127cc94b99765684806d4b8cdd454d27979004a62823fffe045c7ab33ab67a51dda9567fc3afaca49feb81b697bf4a12acf60b63e17560bfae5da89e0f6e2a18f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589162d75aa9e350f87eaed340ef47a18
SHA16ae673c47e5f4cde7d2187f996ff08f2ed9aa039
SHA256cdb1c3943b8325c18424add96d3e0ba22ffa4752600037be0a205ab1be27e5e8
SHA512e291e4da7f69b45d70600cf3720b5ec97e5d5435bbe3697dd9cedc4aea88f349dec78559103084cb43ffddc675a3f6b4b0a6f6bc0a05bb901af8b525c69bcefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293387b293f65ec0e10272df9fcb919e
SHA135e78600a47e3b2e74d78ebf8bc6445c8d77eaa8
SHA25654bc1524a90d28b7669a2d90073de2be27ec8bc886d041d6ef4931682315c8ae
SHA51209b738ccd60e1b045ad77d3221eaaf0d1900fb74426af46fe02a7848513688ed8304bfa3882906e16adb98d360215857a5e44975ba6d0085cd015ff6022ffbd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591682af6b66917c7b867164ccb22d4f4
SHA1b3c09ba0a4004a6e9246e95a682811410397085a
SHA2567ed98d4863dace580df52bf9e084ae819e5322ca144f7dc051d37ac0ce5aded5
SHA5125f277f21ba8bb55d31e92d8c6c8ef7152eddd085d398150207b44d05773996233a56603971d508659a19d97d4f68854a9ad30c64f606359779f2fe0aba1d42f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68934e298132badbc473569bfb86d3a
SHA154a7e8f78b0ffd7d95b3fb09416bb82759832b7f
SHA25642224f9679f94f47b97d50717e525ac801d73bb7bc0549369b565e840c7f6dfb
SHA51289cc6a0bc2f46b9b5e271503d73b261926b448e19f6a65053a14dc70bbae9d9137b54338767c076df7b7398564279297330f7888961c492844770ca1724324fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479b3d385b17fd720477d8c85fe38995
SHA1f222567d3f3b7591a73576e9ed83f859cd3f714f
SHA2565ba795dc9299b7dd26a9df9b5177cd8ab808168a13e8fbab8d7686d4d6fd52dc
SHA5123eb6341c1c03428ac874d6da4cb9fcd953bfdf4db70fa2a6ba8633ca9dbbdaa2780952c0b19e4790023cc75086b318e1e63722bf1acbed1a192e06dd3425af10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876018e4fc76027de8d812c7cc303ed1
SHA18b7b5f863fae56f92cae2fb4d6a1802c4114bf51
SHA2563a0a1e09d35af236c247c6a4a3d5f12831ced483a6a74e20d68689c60665e1eb
SHA512e250c71be34124611c2b165711b71a151b18abef29bd7df87f385b13c67af7a8cfa92ae8a2be977b6b7fc3256dacb6eed68f3e0001838c2286eebf8e15a0acd0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b