Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
31092394cb6ec580564996d2a00d01eb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
31092394cb6ec580564996d2a00d01eb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
31092394cb6ec580564996d2a00d01eb_JaffaCakes118.html
-
Size
140KB
-
MD5
31092394cb6ec580564996d2a00d01eb
-
SHA1
dcb553dd731bcaa7b5278c2937be2d93766cdca6
-
SHA256
a12a15a19cbb16a448aee327ade4201bbc70a4537e98ce12773e9a18c659066e
-
SHA512
0703ac856e7a1aa286026fb096dc973623589bd7898ea739155633c57beaaad266936bb4c53043f07fee42b133dc744f50aa7a0c576cb04c2c79c3f745a1146e
-
SSDEEP
3072:Jg3ghsBS8hI0lx1yapW4vseKUsQ362tJJ1B7P:qKUsQ362tJJ1R
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000017809ca9728b5480b31fccdbd0099f121260ca6767dbf93abdea867be74af0ea000000000e8000000002000020000000a6f2befc508f1267677be3030cf8d7d2c37990611257ea353cfddaca8701e4e2200000008b75ad24936b3922245ac2e415486ddbeae99fa914533c550ec6ba4eca85e71d4000000000220b47d9374536ed179240563354be714e0dafac850812173af2398cccfd9b1444fd639f80650e17a6b5a444779a251f8bf997e6f5c6c56a5434d78d436b71 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF660041-0F10-11EF-B44D-5A451966104F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421536928" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20776eb71da3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1368 iexplore.exe 1368 iexplore.exe 1388 IEXPLORE.EXE 1388 IEXPLORE.EXE 1388 IEXPLORE.EXE 1388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1388 1368 iexplore.exe 28 PID 1368 wrote to memory of 1388 1368 iexplore.exe 28 PID 1368 wrote to memory of 1388 1368 iexplore.exe 28 PID 1368 wrote to memory of 1388 1368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31092394cb6ec580564996d2a00d01eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a0d0a0780cb9abb282fb005d9368f9e
SHA10204e286c55f5e8104020f0d97ac2dccccf0c1ae
SHA25690acc89ecfac3b1a9a0f46b25269c4db2f363cd4355d12e24b14e5187d3669bf
SHA51257c5c3517559032f12ef7c2ab89045fe21d9e73d40faadb90ff84dd1b06f210fd0a05cfd6a8de32ea1d1a6f691fd367860dfc5be9ecadb987edcc2addb182671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504026d439e322d4bea27f1b924903f0c
SHA104c80caa85fa9dd4b0c685c23909e82eeb3f62a8
SHA2564b4f34f32dee6942221b0dc51e359d2424122b7a600edb9542bdd7c16e4a03c7
SHA5128dee1fed87f6e96b029b5ea464f2246cd18e71ccc9be3d83d8c4a4a475820b715dd64b0318010dc37af296435bc4045fe3343e8e5b765bcfaddc730ecddfb009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572983901f8cf30e30529601ffd9903ed
SHA190ce785757d422ee40844a6720a92120b2113802
SHA2568a6d5e10f2106b36f10eec4160d3b9bcdbb96503155a4a6bf2e18b81ed88c184
SHA512574e8df2665f4a21f49623c436f3cf7347e24755e8f878bcd4935baeb363d09010adb19b78003b034816992277393020ac85e828b2dc1de0e335c136778c2843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5535a186abe4d28b70622797740bfd296
SHA187671cc7e3645bbcb30263d9a9755581c74eeb2e
SHA256c950e718f82970c9650f42d46ade6a793255b75be72d7213a0cbb85c2a5adb5b
SHA512fcdbba3a8c40292e0350127c7cae1b182f39923ea589acbb2619efaaee87c76afc133d9c9a4875a47743b3f5747434c212e956268ad63ee38b5e2a7f32f75a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b571b3673936c73dffd6ec8592d98f9f
SHA185792d5d9d3e44f3b13725bfd78ad363629e66e4
SHA256f9310ed97429536de18c66f52da2e0845da5fd7674daa4b4cc158fdc35da7017
SHA51251fd0449fd9188ff660cb216eaa8d7e708733bcf7deaba0eb6aac1e83994b4bcfb60bbe43554d28f9a758b144d6eb3c197f17bacf3bbd5a94936814c46d517d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591310a30efdb5e49fa08d3ef5b732c9c
SHA172f2864f95a8fdd776ec04a094e3545879f43313
SHA256f4e92b2e65b96d2578b4ce5cb8908cf5690fb917a6ca64dece046fea9407380b
SHA512804a9bb12eb878cbc8fd1a7f583a5094d726d2ea49764116cc3a11f29caaef389752f8296508c5d6a1182ad4b97b8bfb5d54b4600a11c79b3708a510e213bd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7303292496211340a033e5934096e12
SHA138d7a13e333c4b35fa5baaabe9ef56841ae0d255
SHA256e1d2a6c32288ee18b64fbb61fd1a98b3f6d59260556b7f51329a563ccefcfc8f
SHA5129b3802bc96d1946c082fa610e1abe54fe4852777eb9f9e7862ce719559a731d4c674760cd2207afb18e3f915b2d8f4bb95772f610d3e3e11bfdfc4b6b1d54ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b10754d66592d77a6049ccc4b99d88
SHA1c8ae3777e81c3b6161e63f0bc6effc9327601186
SHA256efce30e2f502c649cafea003586ee8ee9916c85bdfed43e6250db91ee9fb8205
SHA5128a608255c4ca8ada1d1201915df1d3a9cdd4887a5d09deed6db11cf444a5d3129d845a64bdfcfb9572d24b151e5ab5ae92aa7ab9b75adbf6ef4170934dd8ea3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50340b01178706b46c27042bb37ac74b1
SHA1078926e7d8671e72b4b814830688556ecfe058d3
SHA256496cbd2b6a0eca70db32f3a4c0d14b40f90c9c4509e3ee10bd330b945d0a228b
SHA5124bffebd6816e85e415f0b85ea1aa4a44387a39f263445c80ef2244f208f9ac97b865a4a664cba96b2a6ff37338f04d03dd820de62c92157f5068754d4120f113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ac8a1ffc012fb6c8a05f16656062f9a
SHA1e9686b1a5c50c6275377b19b31b163bbefb55f9d
SHA25656899afa3db48ab2a8775eba1a718fae4c4cf0bcc7bf94cc01d3c3f67c9cab8a
SHA5120600b92f14f314426ecd052ccdc6c8d27cdeff5d3d2f0a3643c49cbe2bf4c83265608d604660bd295f608e329921a393481c82accb223e842f089d93d3f34011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509581462a41ad4fa52c5d787adfb1de0
SHA12fe7b0724189c6c7e4c4e673005e1ef046274d1e
SHA2560e9b0298d16d80acb6bbd9f8ae1821111a527d68bd65ad522a0314a0f97da0c8
SHA512696dea5996258852733a31fda233ef2e9bf0c9df49f573ebdaf5d76df94c9c6230bc0cf9f0911d2a5392d1ff0af250ddfcd0bd9ebd151b2a7a774df9d8897fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3658c44b8d4c0e0097ee86780638a88
SHA1448629f6a768c6455bf8d4ea7aa50551234b98c4
SHA25660b8ab9cae2c9bf41409c2b7a1c9e4a50908a470dfeeb283bf979af6ba245be6
SHA51248d8193051644c072cafb1e225ebd39ceed238a6855c32422ebc7b93e0fd4416e199d3b59cee1a2ea40b542a3bc60ef2fa7b15fcf512b800b8bb3660210652ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56514eb5382cd42d3b3c890628af65ddf
SHA10b409180cb68cec254841b8340ef18984c618654
SHA25662bced49cb8533d673f6f15d6f655867a7bd1f87fa623c86cb0c6ff08ea80afe
SHA512cc98f5c927c31af9018a3697c006d78158e9b8bce0cba0722594ce8bdfc24f3d96db457ec25f69f3150c9c53990388761e6f3d175ecfc41037b2dc52c819dbe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f78d05d81f2b56e962cb4a256d94037
SHA15c5802d27f541447cd653548f0d14cbe2397b352
SHA256922ce1722cc119824c1c0fbaeecad6ebeaf383311c0447f867dc60ec99ad66db
SHA5121da3a27fc2ac334bed2dcc31e7f4a5d3e124731685022405695f5cf69cd8406a0f7dddd8847467a741782e6107d703ae776c5342f56c93265f8c41413abea9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582b17a3d8d8c8c2abb301145ea59695f
SHA1e22d11d45c8fc661dc6c0a7195902fb60eeddf25
SHA2568b79d27942cfb9094ede0a6b7687e830adffb38fe2cfd578d63c711932a64370
SHA512b1e3cc84dc6e7779f58057eec71dcbaf5c67736fef0a98a7e86e77c81ce6cc8397a4a4d6585904314e690593f0c6fdcb7616b8f762604c7b93e285cd68be0f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4a0aed7e5d6c356053c23a2d5db414e
SHA1805a95de03b012dfe30eaed5892f95ac53a13254
SHA256c0fb82dfeaddb2908592f41fd1ff9e58d91f0816eb34a1cd46b50d6ddd0ea7c0
SHA512928fa3565c48bdfa03cebb200374852f23b73105a197737fd645528294d7143a5100c43419a213ae9999b59d16cb353126c76d243123f294bfb5344c62f73cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7cfc6f124d4242be84b0962fc95bf07
SHA1320494f4b90c4af104f5209a476acf38463850e5
SHA256af4c8d97533595ef482c96a2defef7686d79da7f89f677ebe5f8d674f7858396
SHA512304e7170c5e109217db2694916778ae62dd8ea2fb7b75f91d55d534f9ed3805b94058f3d4fc2b401f2524e9ccc402c936a6cb46730d47661689456dc235f3b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d827dbb96e44ad2db1a64f9360369b1c
SHA16eb9909b54ed2121cfd6ae8f161c3bbb01303c67
SHA2564c9a83c2105bc3aa2ba4cddc473a72903c01462025a98f8164024b2b4a782a82
SHA512dc1e92926600b61a81656e52d69264d9147837177aa0615d9901ff81e3c629b8cefb53472757f6e572b31218c81cc1c6f7ebfcf27af8fd47346e4f020fa55b3f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IW68H88T\dragdrop[1].htm
Filesize93B
MD5a9e0327482ee7bf293e61c3cf5b588f2
SHA1ed3c53cd36954bf3528999fb93d2f098a6665581
SHA25622618d8acfbf07b854a4ad0bee1be896052706f3fbaeb34c0d8268ecfd7fdbd4
SHA5121b126163144366e1250f1be076208deb39185856c1d7e88c52fade4e78f94e232f4423671d39553d44ddf28fa040c9bd0c0cb5e86fa5a2fe26489f7a72e476d8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a