Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
2f5224dd30ad45d2038e0b44dbf9ca4a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f5224dd30ad45d2038e0b44dbf9ca4a_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2f5224dd30ad45d2038e0b44dbf9ca4a_JaffaCakes118.html
-
Size
7KB
-
MD5
2f5224dd30ad45d2038e0b44dbf9ca4a
-
SHA1
398785eb0f4887dd8cedc8656830dffdd0409e3d
-
SHA256
362adcbeeda89adfde97f90d8a468b495b54055720a0242cfaa753cf89ba531b
-
SHA512
1852cab090cddcc922282ef28680f624973792f86e964c56ff044789aab337ab65b553520902748951a6fcfe0ddd7e0bda669ebd4144bdb128500635551146d2
-
SSDEEP
96:ev4icGDq79aSmvTV7Nxv0b3c/mNxv0b3TjqSn7BXoNEoRBkum:ev4icGY9aJvZfc7c/ec7TVnxoCoDkum
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D69B9D91-3DE0-11EF-B001-72D3501DAA0F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426684003" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707e2cc6edd1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000aa74d066c2cc192b4b8c61417ab78ac2967b49fc46b0ffb396d62d7b5d9cdeb4000000000e800000000200002000000032c0cbdb1d3e66418ccb3e936ac0005e1dcafcf749b518ebb84600550935ef92200000003765e74640848d5e5de7a2e4ad92881fcd5cc06f318543aef69f3eff73a991dd4000000063f45939ca8dbf26d163cfa5d2b62a6f11601000bab659726327978fb4588d9812c9b34473e0b7ffaf2164458aadfe2497f8d2bd7856f44f29ecaf4c87c90784 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1212 2280 iexplore.exe 30 PID 2280 wrote to memory of 1212 2280 iexplore.exe 30 PID 2280 wrote to memory of 1212 2280 iexplore.exe 30 PID 2280 wrote to memory of 1212 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f5224dd30ad45d2038e0b44dbf9ca4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d5b7f37ad55f7c43490763eae0a4cb
SHA143930b8f12b2b96eb6d8b031263fff1bb53bbe82
SHA256dd3b635389ff4ac7e2b2ee4ca3a452a30de05e0f95ebcd714be739eb94391e78
SHA512b449110c49eab8b285f0a978286eaf84e8a293c4b8edc5121f830b52e57193857fbcc84af5963c189826b92a59e3cd2b59866534bc67fe5d881ef3b0157c2075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f59a581bd89005a1eb24e90fc837142e
SHA14a9bc4a4a5f46698906f559dcbde6c88b2433fcf
SHA2563728b99070eb967e776fd4bd5dab669a6efb30f07706e5b474ee349589dc2c54
SHA5127b982e244e3beda8486d8a6a634ca43173919c9338ade4e438048b539cde79eac6a0be074ad7a0b3d17ce98c307010d560afa984fa5034ff301ba84f411517ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b3184904666eb9baac66aa6a4738e1
SHA1ecee08a9e387675e06511abb57db0f2511cbce89
SHA2568fd76fa955ed89c04f289d76c51ecc7e6f22fcb9e1800bd8b59d617c6950a592
SHA5125e2b6622b6779759a6f018180d89c167f2b01710cde42f0ed6754303be1b2c1a2f5ce5b3c779680e054eb562480bb278e8bc1a1702e7d4f8b4a0714b32414bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49e27e15b19e2e6f191f3c2b8595036
SHA1011be52f46b70325e060685b82fc9028b759f562
SHA256975e0224bc3ab650792083cfd56eb626516f9d20df7050910b80516c0ce14e96
SHA5122388671d60b41c6e6754f3483b4e683ae6546b6ec327bf166805f638d8f708ad31159c1d4606d815c4f99729199b85f4733981b8f5d6b29f23549488e5dcc2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0c17a365a6a8adbae387ff6b53b449
SHA11c873a8feb60c710de71a449362015eef0d3e51d
SHA2567e4c5816717adb0f8f73f77cf3a078e0469a109974ed195dcf2991223df03390
SHA512ae56e513e51b59a01e7ad63b0bc33eac0d46ca53d30ab2072628cd31cc0cf02ff76f2601365df12d4d4d9fcd85f0bebbdef470319d673e209acd3073e781210b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58749ba40665e3341bd579d8b133475cb
SHA10d2a045ee525e23d49b802ee67b3483fcca9278e
SHA25665bb29422c4bc8e85fd179ecf3c90bbb719a7095f5c0fce20129756d25de6b30
SHA512eaee71380fc371ef6ef6b35be67ef76ece8d72c8e957f82d147e6987b499c35602a9b5a4edbcaae2da58730f152951b8feb5866a22b731fb0c9c5ca3d96f1208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b65ef6cb3d5df0aff66fd625fb5dfac
SHA1ca23eb2c2781d254f1954bfc7624f3302a5ff915
SHA256c4aefd656039c9f69c05fe2b3e5b3a8a8a69ba6d5a504a950cb3d1a1a9844f13
SHA5120390f2cb7e6829534add76ddc61a8b5ddc5b0aa10c8a263e30f02dab6f7321f77906c3cc9be2a19700b09ca71ac928779707bf5fb19d65e84610311a04d6348d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e223611bd522ca1dc1e3db866fed91ca
SHA153ee9b1c585dc6cae96fdc96f1b7c0fe030c8f0c
SHA2569f5dc69dc6ebb92634f6dff840c0895f35317e7732be7728967f4b47ac406c0e
SHA512fb79433320e0b2ecb74401194016dd83b1f150772e3089d5717ac9b8ffc378dd3940006e61e3416579c0d08375b62745157f698d8fcef3ab2efec2190e4a881c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629f196c981ddd2241e3205bde7dfd53
SHA1ddab36464367d1c64b9daafb0750e28a10d7b50d
SHA256dc56b8752a47496e72c258608d1679ba6a120b71138e852bb38c1b5663732e3f
SHA5125ebd8f06e70f04986eac0bb14de4822b6695c24f55403c8f46f10c925ab7d7f19154016041c7c67c59840e2278dfbe2403af96cd1e61b5b00baccac97d584044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb58dfbaa4b256f4c9109e005e6aa09f
SHA18612458686940fcc9d0207e159f4026a7aca98fc
SHA2562560e8f512b422dcfd6819f965d7ffae46052f1599ddf2627dbe3a524d580ef0
SHA51244bd6e0c596e9c38598f31283792c21e650c4fc4009bf633e79087073f79a5218ca4920e27ae7bf769e94f7417bc1256ec49e80f738fe5677abd0886b8b7b8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59309e62e7921b67dc692cfa9bbe5b5ab
SHA1d9e2cfcabc42f081fbe013b377d3f8604ab1a159
SHA2564beffc5494f1facb357b590f9ef8f011e0217e2ee7b6587eaa0e011124057609
SHA5120c2a0a4b7620ba478fe90117daf47af0141fe3fdb3d537b1dc233105d3f5ebf37d700acadafff3c63c05a75c0003488f7a9225f32d9a39a002ff83e576149fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc56760ac13219561c9da780d44f51a6
SHA1d8d37796a69cbead6ce11cac1b4b53b936c0ab21
SHA256cc6ab15923d9379aec37f9e6f7bf0bb3346eb44d27f8d9f46a6b14e824677c36
SHA512e1c0da849561905f011aaeeac4c887bbbeac82edd63cd2257060f641856a95805fd515c7756f93e8a6de93be90272bb441feddf154d01c6623bfd9c20817ae62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08a571725a9373b17a2b5d628453020
SHA119578bfc92352ea7f02d77c4661937fa26118c35
SHA2569c80d9494c47cc327c96931c232c5cfa7d0c0aafb59d1236ab287ef8f2618ea0
SHA5122659adeefd53a1e2a8dda3d99cb0333863ed5e4527cd7438eeb3b71e41eab2ade6e3ec99448da576c7bca882f717e7a9fdc146cae7993208e831e7486743ab28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b5a448650a40f8138337f8f66bc653
SHA1d2cfe6ab22ed409932b216bd5435093ced5c89d3
SHA256dd2ed748761eb226ba1f20c2efbcfd68aaa4c2e2c0823ede769fffd7fe14fca3
SHA51275776ab1a6871007045a3749bf2676207708be8e67ca822af3251c90ed125d40896686f0726612ad7e0c87e1b1796f7d60f433d81414ef91569ee07de922ef44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b7f05eac27d26e1f0b83cf1cca9736
SHA114165423634635e31dbe7d4ef3a1b2d776439b2d
SHA256f7c8d52bbb3901d608b5652a6303d1763528b1e5447a1347c9609d9a151a4ccf
SHA512937e4c1c97a270c9294d4e229b165a048314a858283883cd4c0996361b81fe6257495732ffdb11ed32e69b8c8eb5fdd1eff312eafbc6cfb73c8916b3610bf145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c924d30cf90e81e2adf579d4dbaa26
SHA18807520ddf7b86eccf4cc4b61d3813726cc28829
SHA2568550976985a92345ee82577615d6852afae7cb444bb2da6a1e407f55c946e68c
SHA51201d227224b05d709c3eba225a1adeb8d19451ba4103372abdcf8e823f0e8ebc31fcb5f5336c8856d21d524267d38f76269c998fc1da803d325ce8a23c76ca61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57984125bd014a758444f9908cf811aa7
SHA195d2f974a72af908bce19d945143263cd1ea706e
SHA256aa16613e7ae7bf061794363f6d7a351a6c8043552e07d5746d206b5e06825cea
SHA512c512912478bef1b002f0b3c139d7d2b2280fed72389760ffc7359cc21c3a69dfc95d5ac5a12785b1b2862ee5990f2cfb17a10f90f3b7fb21437286292cf897e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b189086222e62d60e444fcc45c49abca
SHA189c726e7bc9e60e296f7c7fb8af74857cc81f6e7
SHA256fbd2f7bf834bd185841fb4d1f0a5b47469afe3bf29524e4bc3c5899aa7e984e6
SHA512c43d6ee38fd7bc835072cdaee4c2197585d3167419fbf551ae6f071990b8577efc30321c6d0c66ca9017d0b86495d3934c5a7541c87459cbffdf8eb8917095ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc937cba8aef587c205532aedaa6dbf6
SHA1ce5003ad398ebec43cf2d48b243c9357ba3a63dd
SHA25677ad5106205d8dc2a5030afbffe66a095e7eeb02acfc2cfe86ab216a7aae15d1
SHA51217ddc0983f099e540ed905b984b20d9bc0d269335ae86998efc20f299cdae3a1de9645367b7f9a7c46c12df7259157a86a5ee36914342a47e97bd1f562b4dfa8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b