Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
2f54b8b93da278bc7cfefdc84cfbf9d6_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f54b8b93da278bc7cfefdc84cfbf9d6_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2f54b8b93da278bc7cfefdc84cfbf9d6_JaffaCakes118.html
-
Size
1KB
-
MD5
2f54b8b93da278bc7cfefdc84cfbf9d6
-
SHA1
7e63edf87d41b7aacf34f6db912addbcd5fe793d
-
SHA256
f5a1103e91d887646016ad2e072ded69e323087c26239d1487c174ff8c91c319
-
SHA512
921be00f5d7657c5c8412a13a2b4d0d4464800673dfcc58a2a6adc7945ebb100f44e207502b14c6bf2ef1175d742a9838b251c139bbaf3f147ce0cada1df142c
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f389abedd1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426683999" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000c0fa3168ddfa3b4810ec718c8e8ad029a2e5ca0d0584a99c47cf634170212468000000000e800000000200002000000049738f87d5d5d123bd07b18762b89ab80341d1c439e0f51b055c8b5f70cbc64c20000000861298bf926486a0efa850fc5c114b08ca6249e792a7559f19d40f8745be7f0d4000000040d86c3b7fbacfef7c811d0233defedd3964b51ac098edd74c70519c5de121d8214ae3ff666c914b9c89194a4fbc75db0dfda7b369408273a6ae9dcf29d14737 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D43BB491-3DE0-11EF-9D6F-6AF53BBB81F8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2956 2308 iexplore.exe 30 PID 2308 wrote to memory of 2956 2308 iexplore.exe 30 PID 2308 wrote to memory of 2956 2308 iexplore.exe 30 PID 2308 wrote to memory of 2956 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f54b8b93da278bc7cfefdc84cfbf9d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3b4fd32233035c8db1536f1c74ba68
SHA1b407b4b20f94f8475479e63f7b60b9a4916edf22
SHA25638fa3c7fccb9374f32ee72e1aa2fc1e0e664d8e04d4a0b8989f0ba81b40e6f9a
SHA51287805cbc8162756f5009875adc3886e7cde2fc786390bebd9ae99bde7a120af2b98836630d74e3eb0813ea36c11b5782ff906e819a6cb249ce9b23573c506f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36d64f7aabbc89914fcf01a07f28419
SHA185e16047e66d6dbab4022eeaa702454cbf164dc1
SHA25672ba0db32bad1a59dc01f4d6f6a9bfe8170924693f44dfa453f99ee5e12a1af8
SHA512186930063e9ef0b1e8984b9edd93f764887bcb84a46ec6a6a110755d173213d3f44f44dad9f1876d1116f1524fd389c2fe416e43be6af1b7777939c7d6662647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97b98f22d5c151823ef1be9fc75b9c7
SHA111347a9923f8434f54b933f685cdd4c24ded8fa9
SHA25601c05c5fb169671ac8e79a4c45f3e7d1e6c978b6f43e162cbddba2e23077ff15
SHA512c36dfd0bc904b5687d7358f287835763e38208933e0b49dd27baf0154f3dcd13d272e0e8ee1b269b41c672e78e61b30e1355ce374b0d4a6e7b09c6e44bd85e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087076e193da0283e67752fad9915580
SHA195fccf25bcd0e8df018fe1d8e3ca34cf8947aec7
SHA25617bbd7b5b46599e3c6108702ef8769b5ea1847df04ef4bd00e0783e00a348782
SHA5123d77ca512e10c4fe4cbdb049876dd8367631e542e97e9f623086e7af4cb0de6edb5cd69c6a2ce40e815a1de077ae065a71272c3b8cdf4d8793c17845ebc1b7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c6d2606b016c8dbcbc81291806dbee
SHA176805db2c661bc7734f6296f224bdd4ebee74362
SHA2563f6a2ebb5b5e783665c5bfd41115e5d99071df87c560c076223606e5da2821ce
SHA5129b27ce2e2684a43463c52f7235ba6eb38b5baa831095509afc3d855a07040509d33ddebd80f4d2c76d206f7daa8403815af570c03b75b9958964ecefc7b8aea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40b49cdfc8ecc4d5948dfdda3f201d2
SHA1f591331c0558a586c15ad54d651e0671af3326c6
SHA256a74c892cd69cfc376f2363da0534eb522f9c288c314c0307b966d2cba6a2345d
SHA512e5f6e63668a390ce96c5e4db858a9088a09d2aff218312695bfd6bcad68b97047237862a8c5bb77a5e454f9d6cc28f5f80d38290b2e616a591564446ea90ad6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d76cf6f0cbe6c7a37619dcb1e166937
SHA1b1e24e2b657f4da6fed355faaf626a87855f1982
SHA2561756b0199baeb5a726f76e623d1c6dbd7ed2f00f175910b0d0a695b272df683a
SHA5129497e64001eb19c7c3e0941993c49104ee48f4aef71855ffe63631c8ab4c4d23344c8253c2e5643de2c63d67b24cfc76e7dcfb46eb22ea22f1e64c4525d1272f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af3fbc0ca72d9958a3354d09bf82515
SHA17cb3d2e44c971eb9eed0edd5019e3533646c0eb4
SHA2567f95a4a49bfa749dafaefe4446993dd07e3cbe661bc200ecfb8730e7049869f5
SHA5123aa9bace618401941af4ea46d05fdfa3e70c40123b8da94e11c08596f2d563167ce2a44833f16d6b2dc6f469e92209a22f83e7716017483fc0c85b7d2633de1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5304d3e6bb3d39296735ccaf92175662b
SHA1f0562622c389f88f5894388a62ab812d7246f1a1
SHA256d4ad1cd02cc4b42a14eab759cef07f62c09be0d5f87a3626efaa79769c942f5e
SHA512c9837894dc2742b66b599bd20cada37b1549a611564c6a3eb3355e4f31da4168d08d3606e35b2b978bf171fe736be61755b2db636d337996b267446c9352a0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2434e00f33f810bb3e829a0dfe75dac
SHA124c606065c21455f01d5ab8df0add32a79d4d229
SHA25692e4c1bcf4ceb8527efbed52d19fd06c850752b679c701a32caee0c1b019a5e4
SHA5124ba7149cf9b5f0962a7777d38786a50aef8a89c6ded19cf8ceb2242d202952c66bf6d6692d8ca12fe42ef8e0e668b92cda3b2494931aff8aca4eb7eb462c3a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c367c81717043d52481ff4b617d7377
SHA1366fa8f66d4fde1c164ada1f7b27b10212cadead
SHA256e8055abd5e46604818f073bb403aa0a75e0c0eba0bc603a7f3ef96604b1e8f4b
SHA512a6982f91da1c2e1cbe81c3fd877924d4b0fb1d5ee03396455395fc26c4cc438e4e46f641c952ec0707eafbf7cf1c506a7e2a48f713b80ee490131f4c058b1b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c37ff60938638b5029e0d8499c0c697
SHA19a64295c6216ef79827d63320bb79062d2f8df17
SHA2560e41b611d975baae8eee82358c73e1e25825eeb7ece5d73e0309c891e979df8f
SHA5121611fe0630d4a1e435f776f8c54bed81807cd72631da611b695f7ad65d815280e32bace1273881f25815f1ba0495e227585b25befa997a6925b42aa4ac9547a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d69276f29ebc341ce2358dd40f77bbf
SHA1a196ca46f7d185eaa92758f6d2fe2a3569fd3b72
SHA2561b97009a24c107cc163155e4c0e139e7f285472de98f03c8518e49126cb21299
SHA5127320730baa2d8b9d665b0112f6b719666a43bb819eac899d3980059a238df95653d6142be9e103856ac189754d307640fde0cb958ec2c64d45aced8fcd252657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dce63ce51f89228fa5a2f059ef915eb
SHA12da95ac4091fc58bb3768801d969bb7ebda5800c
SHA256154023bfcdf2edc4540c235c8e58a999a7aefc5d709dffc433f760974e68c4ae
SHA512c80a0ef3a9eb309268ac22efdc06c2c3e98e89208e480f53855fee306a4c21f4ea5558cb241bc783c210e7cb3db57b75d431e4435eec5150f22bc91a4d48850f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d8fa8bc5ec1b32ac6bca8e8a5cd246
SHA1509a48165e247dd83cd2702105894862dc43aeb8
SHA256734348b97b2cf1e70eab44ac5664cd18b947c3e7ccfb089a2c97954d3e4f3f39
SHA5128af213bfc6a14fed6918661d622e0b35860acc4f7d005336357e4d88a3f8752f5a0c8eb3c6937bcdb8726d9b543732e59e81c91577553ade32a27fc112b4cbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a23e5f8e40d056d84f087bd59dc7a7f
SHA127c2c292665fb6f63cfdd7e0e55a89296f09610b
SHA256c91b2a406499dbed67303f03b6545438789a0ce6fabb12da63bd64283497ab1e
SHA5129f98e12519961b3e15dd2da03886d5d70aa57ae77cbc5b4eb8d11bc803a743960af81121005aa07830b3bc377a8e014c97645ef97fe3fd8487066d09ef4fd8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f69217c02ac135bdf6ce51f8308f8ca
SHA19dcc5310ee6bb4a6f5ed2eff4c8bd302db087bcf
SHA25655a58a0f8ca9adad8bc8956d9b22beaf63f9f50ad57ae86e5bb11c72c04106e9
SHA51230bdab180c35c6c1260fb8620ab10650330e3a9b70aa57b9fb182dd5ee13a7e24ca04e1e1a4ef40f1ad9af2e77e756d0d392a5d18effa7415776066c69e9d9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b8bb18178b59ba0ed202617c926d90
SHA126daebfcce72a90d978c2f300e1466dc5ecd8fb8
SHA25620d7c258c83161b96b72ad3d5811cd08966480698933a5078213f3e28a670dba
SHA51234283268fd9b19956869bef55af300f7bf3c0d8775b8b805922e2ff4f2d5f0f3ae290801019f3c2294930a8b3d76dc0357949980f1185b8dc9c26560a7d57058
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b