Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
36a13488f52fd26e52aae4d2f92bcc1a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
36a13488f52fd26e52aae4d2f92bcc1a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
36a13488f52fd26e52aae4d2f92bcc1a_JaffaCakes118.html
-
Size
4KB
-
MD5
36a13488f52fd26e52aae4d2f92bcc1a
-
SHA1
b8a25d48b9651f0eb8d0ba3ba9f5faf38a4f3c2a
-
SHA256
e097e4958a232589dc14c2f46e90b3abeca8891e4f692f0c3ce48db359a5fa40
-
SHA512
27244884a2486ee713554f6d285f1f5333a9b3f8705f49136210d7be0788884b5d130e0c89d60d91ec27328fc847fc2922341d456980585d3e7f2c7c82ba6634
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oUcopG6d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000029f1ce7a55a6a1df12f9993f907d16232f704bb0900ccbabcbfe9f8e7d2f2af3000000000e8000000002000020000000d0de6e298e84307173312398df26756f7439feb78898b147ee75b595cccf28bb200000001532ebe6f80437446a790ea44798bc5beab34bc8d2859ca9b4c7ab1a890f1a6c400000008be098db901cee1a77aca7c381143d8244165b6dc6810c801c2c6c4a82de7337dc5ed8c15ce5ba1d47cff894f0aebc26be74c733abea028216474f8209644564 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8073382deaa3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421624749" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58C09D71-0FDD-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1236 2228 iexplore.exe 28 PID 2228 wrote to memory of 1236 2228 iexplore.exe 28 PID 2228 wrote to memory of 1236 2228 iexplore.exe 28 PID 2228 wrote to memory of 1236 2228 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36a13488f52fd26e52aae4d2f92bcc1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b2907a9227c2849b14a0d5b6e1d4a33
SHA1be1e666a281e66c55df05da06870c5a7f223eea0
SHA256e67bc2b057053310d07c6d9e459bc4c46bea68dfa5a167c55d0565a13cef5d6b
SHA51206458d7ec69ae8a69401f01c3fa2a381a750aaf531e34d5c8310db02544fcf99dbfdec4f42fecab468f3fd243040d00150a76bd81021f8f09200004e7fc6a2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5722379394bcd2e46509ebe661ed4a2c6
SHA1a99c60852650ae8de0d512d97feb67b4731bb4f5
SHA2560d6b3bcfe2077646c33d646e3c8e5a1f194f6081d04e2abdb8ebefbebec918fb
SHA512ba8bfaed61d77fda2e0ada5bb13b780a18c24f9f80479ba13d92fbdee315ba81554ac025b17142b439d55966db2f14eb513680cdebea99916a5f7479372e2d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a64cc59512b495946724eb8eb18181
SHA1ddc63c48b4421a0adc4aa8165e3e8ad88f8929c8
SHA25695d996ef87b3771f7ef18e8dccd7a8625cba0816faf957995552518f84318583
SHA512cebdf845146a143c02b5217ad4aeba914df200a58ff73342feecd43451b3cd93235b1ec72bd3e0bcfbccbd4c4dc6816ad6f78369869962fcb29fb6a9c764c20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d42753be00c0ad3f60d28b1f4a5262
SHA1893f57f56eb5b3b763030503f06b0ee8d2fc04bd
SHA2562b7d04dae98cfd287cd8821c53dfda0c4ff0cce17834cf77c4efcc97af72e1d2
SHA5128e36131a0da577f0c139caf21e44aacdc4e3d75fc1141c70d68ad6ee53975e5c6f250285620ad1d2205cb99560c8d62112fa5b829c307eee98d10dc520ba235d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f73bc5d3d1665279383532201eba9c
SHA1a952cb3b3298a38e3dd2c6f71c8a949546920230
SHA2567876cf00f7b9492e4c004cbac2bb6fb4fcbe9979cc9db080837f34e7ea5e6dba
SHA512ce4d0634b0c6ec0ecc5201d0704852a6ad974a8265b1ce9122144cea8740ebb4db0445ccf9fa006a3e32a56c64e14096adeeb5876af42762bb067c6cd62f8d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5805f18a2743356581ecccacf53ba236d
SHA1d52f4f5e9bbf7fbdba3c4b0e5db9335400d02d01
SHA25633a9bad789f1b1d3f3d6479a7e24cebfc5b693dec0b206765ec26df495ebbf0f
SHA512a8d6460947fadb3e3813c1c2503f2faf956f22a1cc480db18c99a5ac2fd5f2b1976ce7aeb3c54ae8786cde91691ee9d4307bd0589712db41740d4a6c1ad8dda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5737c0a23bf0076aee583fc73050665de
SHA12844f70bf2fd3d1e12ca539f458cfb7db62e422b
SHA256d3cab39fea0e51b3befdf7e93371be1a8f69c4590910e8388d6ff794374ca221
SHA512357f8bfc23ad9abd33450e0de38cfcac6126a0d30f4735c5eb201d6bdf199621b0992e3b389a6ca2b2acd4cf09709bd12ea84fa1a7a3a229265787e7ce0b814d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6583dead7fe9b298babe754a937f80
SHA17c6aa6f64da2aa0e911cefc176e76ec9c7e0e29a
SHA2563b02ed23e36568160fccaa454afe42aa98bea85c9e3b57b14414800f73db5d90
SHA51290cd14ec20f645978ae29a261462226181da9dfbe3883963850c8cb99ae836357adfa0f180533d819e066798ec512bc7c2cd7b4f18866538ac098ad06d25753d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562be59ba092429e6f7c0fc7d78413709
SHA1f726a232091ab5e3acb01fc4209db0ea9b7c61ea
SHA25683d0a520504fec628df22a04afbefc1b6bc8a53cb700ddd28e80a9200d9220ac
SHA512fe81d2c237161db9f6adfd65d94416ec8c707ba700f67ccbf14fefa4e5c6e8edcdd3e58b5a1b136aae631c29ed6756c407fe92d02cdc8817f2b74963e681b807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561ff053fbcea8acfa364252659d475cd
SHA113c209ebccbfa29940f037cd1e037ff72bcbf151
SHA256024eed8a76c95ae7965f26ce1541e6bc0d20ff87f1f8c256e732a5beecce5e98
SHA5128477140d5454ced24e85e5907953b426cadf1784a585b31f290bcf398ad6235e39df3b779934361ba5a6df877129a8fced990c9c980b9a4c8aa621c2a10c32ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd058cc0a80afcb9cabd100d1e6f20d
SHA14ac74109507de4d9fbb602623e88fd07734dd174
SHA2566df819d1fc00ddc2cd7ae116ab8ff0fe1feb5c4adf35fae9612489f8342ed8c0
SHA512e433646ad8ff3a9bc05694aecd2db1fdb07b1acc34e46eec71aa9d736c280e5441221975bc9c5b0e710cd58de629eb0993ab70e5e654d004bb63881b11b57a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541863a89fdd72ce43f05b07f65dd67c6
SHA19938bcb0963c7988254e69d3a1e8ee74d5a6488b
SHA256da524f7f449dd4a33b2a11915452197f7ba6aef57428b83c75e571fb08ad0616
SHA5125537a35b37de9b93c0238599d79d11187fbb71f38186e7b51e503eb43a3e58c7a041b7c3a9fcf58144bdd878cb32a1c829789a9cfdf052d0dfa438d127542c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511193b126fbb750091b2c446ca5e0d6f
SHA1e961d105828b5a2bf38ef6378eb22f7a8edb10ab
SHA256d0e1f554a77d239c2e337d1aa1ca29b582949fc0d9f3e70ebf67ec720b36f74c
SHA5127fcbdac81d92dcb8289894b896a05027588ac003d5364bdf6ea1459b28ed6f5193f23a2acc790b04c785ae5218983962682851f73517abee83c15e8c6a163e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e2e5c3dc3b24aa7cbda933b968f20e2
SHA1684f14275bb6a85d8573b55097de3fa390f55080
SHA2568fd45cfea8324da5a806fc06b866af293fb1aac46bd98805e2f26d41e85e67f3
SHA512d7dcc497a9bd9f239a221cafd29ba7b1a98e28959e0fc7814dc0ce78c6c81a7d97ef82e0fecc024a0f3f627a20cf3fd8b419b50dccf9d2fbb39328b041bfdf77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e97ff3f73400cebc1a3f8a3a1a41265e
SHA1f63ea416179e207bc56f3f664b444d4cb2fd3649
SHA25694fcc5315b4fc45ed9c98b117e40b3dcc33bd80f98c41ae81e58aa45ca21d372
SHA512f072bcc3d9d8d1f41f395b91927a5e3360933204db6ce7bf66100828233d9d9d872b892f28561200ca6e087383db0540cbcdf344da13a389fe094c607d33c190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5656370243b47302ed50764cf727a216d
SHA167e4b0c81a5f0a9a5d469134a63222a024036c96
SHA25687ee81863e0c09334191b9956c87ee54b894ddee6a2fa4056afe1bc0cc9d7575
SHA512d3dbbf7a6981c23c994cf500ef59041b1e08dfa1ca77c4f7a0cc3188dbb871be255c35690fb289a1f10552e7d1c44db8d9434cfbe738b55836a4071b7148eee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccb8f5ae9080ca7480638d8f91a1252e
SHA1dfa888c79eb57a9787455683d38d096e8942bd77
SHA256f922eb124aac25a1ff7bee3c3185d92856b1fa2b0dd75efdaa0197802a6ab054
SHA512edc047fdd6afb66fea3f73b75b8a7136e6488a2d319b4de4c7a459adbfa209bd62aabcf5843d337f94ee3a344753a8d0604144bb47bf08bc071c44f226cbc7d7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a