Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
344b8794150ce5ce9dbf3597f8a232c4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
344b8794150ce5ce9dbf3597f8a232c4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
344b8794150ce5ce9dbf3597f8a232c4_JaffaCakes118.html
-
Size
57KB
-
MD5
344b8794150ce5ce9dbf3597f8a232c4
-
SHA1
01ec7262e05df3d6713fb52ad253f5f803e59ac0
-
SHA256
41beb6b55fe4e6074129cd64246d563857f0945b49ab7c25e2ae92ee7c02b523
-
SHA512
fc7ab39c562e4c5cc7a4783d9647be5c2a6b7dd32c57bcbcd4b885f061a15947aa9a1b86a05de2cc582e60fb4fa50c10a5f6fb5b959b99a88d881fa433f7a8f1
-
SSDEEP
1536:gQZBCCOdv0IxCztFthrLPxHD57bfdpNt75e42uEGuYSmYu2muvQO+6k+K2SOiWw+:gk210IxKthrLPxHD57bfdpNt75e42uE/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000744cbd78bc5e2d2bacae0eabe120a2899a5cc707d76919bf7244febe1130ce04000000000e8000000002000020000000d10a0bb38874d6277f22335bbca17b4221e06204bb655f81aa09fb930e7405ac2000000067675dacf0c7290c783be7385089adc51b8a8fb8ca26704a6f8a634c0f6cb3434000000068396805dcf0a5999048f4c48f75a6fb37b4d25483af2aa39fdd0e755be5ead5f6ff4ca0176b6fb18bf65ae37bcf7160ae911337884f4ddf132c1df18a583275 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5713FB61-3EA5-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90394c2eb2d2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426768400" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2324 2824 iexplore.exe 31 PID 2824 wrote to memory of 2324 2824 iexplore.exe 31 PID 2824 wrote to memory of 2324 2824 iexplore.exe 31 PID 2824 wrote to memory of 2324 2824 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\344b8794150ce5ce9dbf3597f8a232c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d3e1af380286fafa178e7301e65075
SHA1fe8b375d265d3b99326746b32feb31482826eee7
SHA256b89d1b9e64d440c58c3f2fee28dfda8d9937cb26faa40b5a9c3923f2480d4fb4
SHA5127b843ecac3c03cff619a3e5b4f19b8ad69ba835d0983c7478a0e1ef222cdacddb9e85fa637b35da74f7e36b9085b2e910088b13356bf9a78bf409001b284fd98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5670eca7c77fddee3a59ee6bbd322e9f5
SHA17daab8e05859d9edc49925cff4ac13031f4873fe
SHA2565ad5e500752606aca8d18b91ceb8d5430c4c777fe2bf29541ba7ea2b7e4b7ba8
SHA51241c1a003ebb79e373b4607abdbd28d0e9ffafaafd14bf900db6520f0c4dde8758d03c7b65f78dd4ad5253e7b5217a5de92e8d4c7755d62a6390dd9dfe5784693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577cf7b1b9fae5662883706f86a24d861
SHA1042e5ff337a2c99557d753ba02cc13db8072bcc4
SHA2562fd6416d1d4db82322a265dee7d8d4b1fa9bdf0a9b80499b381929242355ed18
SHA51257919cc9a9aca3b88085c106939bedb4a9886c805ab2406743f72fef21af800438f05e9b8165df614cde1c62611178609808f932daa85afcbf81fbc0b4bc7f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db2e3d146b19743e4a3a71674697e53
SHA11ba9e7f697d0dd25c66946c8eb8053ec8c2de409
SHA256ba925743796497d2933d750013bd230ca4f238466736cf448b1b910323868758
SHA51232fd656b9728a8bea7acaff55d330cc7a4628b8d04c30560510a13a0839f77dc09e737b6be47c9445acb0fc5c3227758243d1b53c526e8ba332fce018f46bd84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e4a069d729eb6119006b1002c36e69
SHA1bbe515ca7900ef2a1c15ef757222386b6cfb5579
SHA25666cf48f00c9b1a31b90db13cad2520de502f5e1ef85863db5e336dd8140de37c
SHA51282b6b7aa002c3580939e66e9f3850fc61f3f891d878728caa3ad41f817d69b09db0296682e38f517ddf5d464385c2978c746a3d788335c1e65434c2e1a212287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d74a32b3b53ef0d881d427b2d98cea
SHA1b15e57a89d35e8551742190da2e91d2ccd6abf66
SHA2569aae3cc0bc59153a8245cd5ca29555b1836b6726132fbebe83709e4a7c7fd048
SHA512451b3114229a6b7852a4f7bdbb5304211553e29805f219593e5553b56d0bfc88361fd70971a71cabd57d67e54a07e6499f4f0dabf8d808aa3908dec500bd03c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5198d5f177481a41021644b22d9fb3e4c
SHA192a2c1973ae2a3a4f1b9b0f0ce7c836b28234a3a
SHA2564db34416fdf8fd34b6e9fe416a876597dd1d025aeed357cccf9f3f5831ce72fe
SHA512cbb792ed0c9503c5747cf1927166dcb94e8837532b57c82a47422e81c2bedf09ea5ceef7e225a13fde853e95e4de5dc9970686b8ee6f7ce1e833ec8ce7493b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e08aa985b16091c2e48d980b59859a
SHA15a34ceb97d31435c98379446203b3ff4a558be1c
SHA2569418a4a505b58bc7e6131692fd2521a5d93845651efedaefa4657801bbe9dc29
SHA5120bb185ea6df00baa41b3752706fd685ef5856563fa4c054a0d98867e327c3cd1320991e88cdb43ccee58036d37a48909067920468bfb6b37caceea6d2af84d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2a0ebb2d484aab734209783458ba44
SHA191a81478634b68e933e110685a0a1d74c8ba9790
SHA256ebcbe18412a27541be3e20e3cd9132fe01af654a8a3086d09f7671531ff06aad
SHA51267fd693c57d2a36194c53c9969a9d2f802b23d753e73f868d722e8b0ca9045bfd6547bf181a0a6d422c62177ce01479eaa700484d399790dfaf09b458182c112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f603d88eb8d3ab6bb0e0aea97822a2
SHA1a4ac8080ee3d1e136125e84d6fecf7ca5d1c1ecf
SHA256077fd7c3b048b433d7c0e670a94775af7de03e8b5f4c30032118dbe5941c0c6f
SHA512e8e6211b7f88c9f4dc3e8157543abd082e9acabc08f4ef968d85e48dd76e3127047d4c93a713ef6bd4ee7578411f0d3e0b5f47c9065810c1d6fe02e85ee59ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538251724a37b84fe438b38c448bbedb4
SHA1150bc08f6e40a57b2188d2e82d8b8b582ed8e57a
SHA25675e5d25e6d048f378a3f271b2fa623706b2e7c39039669708d651ec277b6d70c
SHA51215cd21c270b8555b3339637d6e8f77721ea1193fd33469ace26bfcf18c7a1036baa7648f6b77ea411db838f9655ce77ac166adbc09adbc1340dac756fa8806a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc41eea8ed01939d0c9c9c27ab6f53d7
SHA1d0800eab1de9835331a32a4559447e9359de8aca
SHA256100b35b615eb1e6314aa49cb33638aaafc1bbb0b165453728b81774eda254b78
SHA512a06fff16682274766d40dc3e7471409bc517fad8d03895c8e5fb64b9dfd4268f7f265ef4f2228e49c9775c9398c85e2a25a6b4ae0bb064bc1d8533c305e5ccfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fbc49f4b0788fa481a75ed2a1f2e09
SHA1804eda6780aa0a9787864227656134fc88b2ae76
SHA256d1ce45a0ebb2fef358874dac7c888bad2d47dd3d52ecd48cdc435e90c82722fc
SHA5128e7bcb8e59c11fcee30a4051906dc75b2206b29076bffc1ecce9e2ff437d14c32c7da520e0b3090802b7fdd1699f7936c79032cdd8e088b129b28985b669ac51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e6a0a9385a58f707a7d3cb6612f846
SHA1044f8930748ec26a332bd62fcf6c060befe985a0
SHA25656eba8aad05939190f7f149eff0d530eec2bd5432b1935fd625cb72a9258272c
SHA5121fbad949282a31754970c88544c3bb2e1b71716e2f2b50632a1ed8b6bc48c9202f9264089b197dd05c826ec47614edaff5b4d46fb5acae3c1796d5fa79805519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50030c78cb5cd06ab54509db37d69e337
SHA17ae3176183bedfab306236510f02982c3eba0d64
SHA256cff8cdf624d080317127448075745720b2226e7a1b667fd745374a42977552cd
SHA5123bfe8a1b166ac1d2ecc3be75add0d7f0b252305e772c91ce0ec4b48e539b560210f134a887a9c7caa3fb203dd73aa2d11d186a989aeef8536e0b926ff78e2709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531523854e92df3ce7bfdc47bc9988e39
SHA1fccbdac7aa2d0bf6fe56ef72830560d3eba2b94b
SHA256ee252ce128918dc5b7fb1a578dfe070669282908232413f1fd7c877355b7c17a
SHA51252cc64a204d777cc1906d52fd056467d439eefe1d7165e9852b4371ce6f3a080338aabf398eebb5e09823c2c60b4330cbb5022209e1ffa08460dc39422b83a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee2b6bd171cb3bdf704d0d43168587b
SHA17ccb7d881c4426db4fceb086d46e85b116723848
SHA2564679d32fc09c40cd2af13cccab0a91a5cf0aa298c29cb5f411623813d1159e4c
SHA5126a56cb161d5124818823e739ee552e2ce11e862acb96368462ea7d4166571fba4d0957c43e49b053dc76ab562d4bab78f68d94dbf7fd0edbc9ece8cc5a804495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c9aadcec5479231e120433c50216ef
SHA122effd4a5943ec51b494c8d1a2d23b69b838d28c
SHA25637190dd929ab793cd538b935d9f2f599fe1ea36775eb6b42eacb578372b96546
SHA5122c9beff019f996d3ee47da3b986f14c124e6d9f46e004cbb08d567cf551dbd58d711a9837211506be832c588d5a387950952f8bebd96023dec9832e45cc2748f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa864fdb3ae31bbebe10015e74a3485
SHA17e1827cd41dcc75dddafa24ab4488c1f5df3b919
SHA256391ec0416558a0b1173aef3f23ebb4d38a81ded1c6e363d2771ef8f47e7fe9ce
SHA51239c6d3ad2d741788d5487b81ef11b9abb545d74a5d128479702bf1d8c082219bb47463a5eb321f1e35675eea8f9c048580413061776c89e719d1ea98f9e59e56
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b