Analysis
-
max time kernel
138s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
2f2d224edcc4049ef8ec4f159b25908d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f2d224edcc4049ef8ec4f159b25908d_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2f2d224edcc4049ef8ec4f159b25908d_JaffaCakes118.html
-
Size
5KB
-
MD5
2f2d224edcc4049ef8ec4f159b25908d
-
SHA1
be9dbdc9325f9819c7eae9e2a765d207c7c1178b
-
SHA256
994507fe972a02d00afa56c8c21a075f4499b8e5cfdcd78494904cbec46fd57e
-
SHA512
b46f6873fc9ac02073c7b3962249f611c5a4a805064a7edccb843bc104fe6625108d9943b060dbc58ce55a083ce45a41ed0525736bb9cef5baba6dc763f6f34c
-
SSDEEP
96:5SghVKFghXNpncDengoPDFDL1KqASGcEPXo2Dg:57WghVBDxA42Dg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{231C97C1-3DDA-11EF-A173-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000004dd6e6f7fdcb91e2961a98d0526dc97fcf251e61df2b9a7566ad11226ed62822000000000e800000000200002000000014915925067987b8ffc2e891534a631a0a0e7f0bf068fbc45593ac6d555e3621200000005d4df886804f742bcae8bd92745e978b36bdd3c41b75eca682683ca171f4a84440000000d0c3b308964bb2461e26ba9ef5d7e12879e297daeb673c7aa2dd73ad839167d0cbd1ab6698e1fb2e41d5c82991da2a8a0fed60cbc0d0d9235cc85ed66c233d64 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426681125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705af937e7d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1824 2112 iexplore.exe 30 PID 2112 wrote to memory of 1824 2112 iexplore.exe 30 PID 2112 wrote to memory of 1824 2112 iexplore.exe 30 PID 2112 wrote to memory of 1824 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f2d224edcc4049ef8ec4f159b25908d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD538cc4f95b0d33d2caaecb09380015a38
SHA18fa80bd9521e7de875df1c3778826a5e1f00c709
SHA2566fadbd19f057f622eddd5a0a882e12033ced224471216bd34331436a14d855d7
SHA51284f1d4a578dc42f1ed7ff91d62a46a6fb72e5b2566469bcbfc3c6cf5b38f1a3e77536d0d8035999060efe023ff09647f174b9defbe44bd01f3d8d1cae19be022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500378010d93ed674c61fd596223b1725
SHA1e6d2a195db6e29e43432df5dc1736cd40fb0afbd
SHA256bff34da96c1d33380d91de5045f9a30152754844f8036679fbf61fba79011a37
SHA512f186a734d578d149f7405ab19e124f8b5063786e7f4f067d5dcaa46cb018208406a81bce6a750cfd83a2e543e190d9f8561586617ddcf3b9f3a2128a57ff30e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD560165eda79310ccbe7202b5cb4242b98
SHA1bd528d34b5e9edcf549a07b90ce2cf2778da1873
SHA2565ae8610700307369fce9316423585433557b50f50f22382455c34842c4c2d010
SHA5125188278684a498f436aadf48985ea8295edaf400cab3c9a9373af37dfd0875b109905edd4670e9c0929c6ae6dd294924f6f57ce4d507eca308a2a0a556229f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5269e166dda69959d74be6b93f91cfcea
SHA1eed836e3cf4149d5526ef1e957bdc08d51f8c4f8
SHA256175e66028d03e7c0e84fcd3cad75301be96c856441bc10fe5191c454051d4ce4
SHA512e15edcf9c134ef4861eb7a93b76430976c35f32d0a20098143f298ef507765ba352230b89cbc77db35beb1bb64e61d67f5392ff3564b712c18442a830c62e078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552c50c8ce2870be8575515927f23dda9
SHA113d6ef1f3d2ff54b5159c90816cdbd09c0b4ef0b
SHA256cf034bda26d3723257cbbdc8f272aa2c9dd7493aeaf3814161ab8e3a263bf500
SHA5128a2dc3fe62f04c6d67dac1e04e50ebe43d8b4b430c7e9a2fb93ba7d02733de15fddcbdb49949a60b6933655baf50d97827bdf07975d1355bcb5394049aaed14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fab311b801aa412cf13a8c9a57c0cad6
SHA11d7f669bc81d260d8f13679c1dddd2df1960ea46
SHA2561677eb0083387cd9fc8c626251604fa8b7ec44f1c2d19a54fb6821619a3f3c51
SHA5122253458e02926efdccd96e287cbc6c03132e5e6cffef613fa0c681c784f917bc70f1be3dbed76ddd133a8bb25be1913f29390cad5ce29ee655e22629e745cf37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD599ad70fdd26c317f219a6421169c9a39
SHA106a6f3d2d7e50beabeacafaf58327f7f55059b5d
SHA2566a8774fd4e0d81830c61935e73ad90a0fe30e612666aec66843c9f4b4bb5bf30
SHA5122f10fac9bad564f9aa0e2a97899e166d5204cc781b6212c32cb3864cab3317d6e1c3d1dcc5f365a094e19b80681de2a429efa8f9b729137abad478763f3f250e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a58183f1e96e0df82604978ca8aa262a
SHA1aae6b1cf5f71bdcad48cc1c00777545a2eb07b98
SHA25663099481ab0e0e868c1444e3c717109da186e95c48ebf5cc0454377887cc4740
SHA512abfc864d321614ddfe4ff48612bea042a23dfb73ad43dda828a4ce8e9dc6fcb41a11fde9b2ed2aff8426d5a4b4eca480952b9eece3736343205198cd55d42f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57a923855de42675173de0c7f20faf419
SHA1e94b6b9e2d0afdccabf0fe86e6e65e908eafdbeb
SHA256285433e65875232f23d64061aae9bd3cba1c4f2d099a9d900d39009307415ee7
SHA5125d981a01dbd0a3ead165e0281d488b44d2df8b825c8c411ad69323b87c4d540038d0a33dca8f55564095d63b2954e62e8308bbdb84f6c0eab96ce9947feab091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54cf6a5035001fa9ff1d62615156db28e
SHA1f5a7127c6ede82ee924ed2183081b2a909808cac
SHA256f8f7b2f6de8b120a794d00f210627ba29457738ead6d427f46035000c2dd6b07
SHA51282a5e83164db9c33ff4d9413515c7f638e795b5c5134ee1fd0b3bf87f8912fa19463088334e6eb88305332819f5aa52ff9eb8e8583dea9940ffeedb745960eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cdc50817215021b8c9a5c349579a87b3
SHA17c29ae92a4149fb123c01b3e93f25dbca511c3ec
SHA25623186a577715d57a00ef97dc89a9e4f05bdac7c535ae77442600d8718b04a8e9
SHA5129699e10571b9416dc583b85199f498db3e6ffa509ae086b436aed11d98f244ab343c48edba3446e529cd5ad3a410a493676f7832a4652128368787f8a8282645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5daf68801454d2d2e62af7352c3b2567f
SHA19a3fd692cacafa4651d9c480d21c51a9c8ddabcd
SHA2561951a67821812cab54ca17db97df9cba59d38ff0bb5ff3387a497c6569894548
SHA512ed0053d560a4e81a7460ddbcc90957a8cd3c101a2ab442af6c66e8b968fed55ed5a4c245b07edb96b90ef60d76b13581a1a1913d9eef76dd735738f1633645f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b3b14683db30b3e698ca971a1c6240e8
SHA1e059578a85b458bf350affb8026835f8d0a45a2e
SHA256eb9a889184211a0e3e26369d64bf2a097d8c1a4fbf20cfa0cc3e71910fc2ff58
SHA512d6d83e5e9d05580ec2ad7ccb765f48c876781ffe7b2b16997644b94f46cb8f942022377705a8945189c88e8fd75173af372c4e00bda074cea5073067c309e7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552ca47c91281fd59178595170a6732a4
SHA1493e73c85299428a35d30dda6b129406dea275de
SHA2561fd5d551e372b42bf73fdbdf784d5fe35093940d9254889c2656a4fc643ca5fa
SHA512ad76a816d064ea38a78eb9168e61ed7e87d607c2cebe8e09300adbabd63ec47cc14197b88eb963441c0f83499064edb281d06b78869b2fe3e91ad18eec7356e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d1efa79a92ad6fedf939b43600c769a
SHA19e3662737e86f549ce69e2de3e661b0cb3c576e5
SHA256b34b21e231e819b5ba169fc3d209bad613d29ac6af42f93124aac5d666fefbeb
SHA512c2b691924cdb8c2ea3028b048f646c1954e6de17935f4c8ec2d4b9f0b78a924a465ce70f4bc69704c9a54032e9ef1504e6b6975b6d614e6196787edf9d3ecfe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5083d0fded18ade0bb8be94dec00325ad
SHA19ec013daa8c6eda813c5780701045d24d6cd8c9f
SHA256ef67447c2437f39b657b2b32f895e7e979b496f758ffcd19e8b2453344aaef58
SHA5127ed28f764ccb92e745976534b0bf5941bd597d114c77aa6db73781edba02d4faa058a51f0b5ccd1e3e202e25a89e55ce21765c2f4193567d7ac33fe3fc0d14e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54afedb4816775a6cede35990424f7e76
SHA186f5194efd71027bcf8d4afb988b0ecd6b41dcb5
SHA25643b9f518793f8591c6ec1f33e8b395cfd34710d96fc4412fcb50376e1ab99c07
SHA5127dc58db891119ffc6906e90ee43ca625b6c31f2f5782ad90cc74bf38ea28ab09b0a88364d600b53bfa31244535ee0216fb8f56ccfb9f16e19578f64a3513dffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53bb2569b05baf3bb2526b299d2ed8329
SHA1dc9bf81e9a33d8bda8c336f831b85c62f6dfcd7c
SHA256f03f21c44ca634e012c8857d0ec46b55075c9ae994bae23c3e6f4ea722b6db99
SHA512c03fd48ddbdcc19ff7ac404622daa305505dcdbd9256bf955cadff14a6f353f970ba70c9d1b5f05d4b2c0b641135b944610606fd072581fd39b915442c98cfeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5865ea858b1870ff9f9d689ad026f3604
SHA1b451b7eeac824c6efa916084392de1f7bd401e6b
SHA256bf868a90b34e2d1a284e4835bff34fc9fcaee592ee47d16ec49d9fd838ea8239
SHA512a32a275c4262a80611f7e999440196f98e56a4d32821f5a004e1fd8cd0ba59be7675b67233709465b5b5387532cbe026e875b6c5784c8ea35772844d7f901aef
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\freesitee[1].htm
Filesize167B
MD5f5d40b7259645010f9a248858ad14178
SHA1b3051d17a6ec8c9e166bf09a62b48261ab86957b
SHA2567f5007068d2b56ea9735e2490d60cff2e72cae312024ac1f6c91158eba47d05d
SHA5121e82bc2d067f726670b3e6054d73e57868f6e7c50eb979696bf927daeef699f2d8f8de201e8252b86b0e9f86dc69e5037fc9fa08ef6c271b033f29d4f0f4c1aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b