Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
36a68d484e5a1acd292a374033538b51_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
36a68d484e5a1acd292a374033538b51_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
36a68d484e5a1acd292a374033538b51_JaffaCakes118.html
-
Size
27KB
-
MD5
36a68d484e5a1acd292a374033538b51
-
SHA1
2c23c95085d83ba81a83dacc3641d4bf53269b99
-
SHA256
42b8aa3806a6da69f0a97e8644bc19652b318ae67231b1e349cc6d513e2ddf91
-
SHA512
fda7c80090e2af27da9512b6f0568fc6671932e7cb5b476b28e6e6584bdc0675547a510e88f7ed7b6bb0d78a4b2057a773f9d71cd2254e09aefefcc5741339e8
-
SSDEEP
768:H1S0m8MV4UwhZgEhyYCGCgCUCXChCWCYCfw2rINhk2Z75L/e1:H1pm1V4UwhZgEhyYP9dYu9tow2rINhkv
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cb97f2eaa3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000003964d08b455c4571c8876ecd899c4204c244c8bbc3198ef03e18130fbb715679000000000e8000000002000020000000c4e92a753c68272dfa3c675782046c914340c68c9bd6f3994f3a489e8a37bb022000000046c277c06af9b7a15c54a42a76db00c5878312d6806ba792c56a4c1a71f30bc240000000e15d1433a3ca9f11d255938c6d4289c9cfbb77011b996d330afde2c43ba590f84d892e9f968bcc80a901260d388221d0ce08698b16e520ea9a4d1ecccde5872d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B164781-0FDE-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421625076" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1060 1504 iexplore.exe 28 PID 1504 wrote to memory of 1060 1504 iexplore.exe 28 PID 1504 wrote to memory of 1060 1504 iexplore.exe 28 PID 1504 wrote to memory of 1060 1504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36a68d484e5a1acd292a374033538b51_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4702256eb25e49d3823381c88ae3902
SHA1606657335252990727c7ccc3edac7c279aa5ca65
SHA256c6d3c42a0dcaa9e86c10d30936b6defd8b21515db384d7242ffe08a97d0a2954
SHA512904a1ff2466170454682115dfbf7f1d523e6982da588f8d22a9ccf6c18aad018d5cccddec1ee142ba47783b5a16dfc4967ed23de147e35d46b31a32c1c148b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5880868034b274336e03bf9f413bdadd8
SHA168619ca392e5251f5a169bbca1db1de221cf5b04
SHA256d53b7517ec19ce48a7c150a7b9074322d597527b1155739da822872f5cc53352
SHA512b3779e63fd75d11e952282e875c3467d9ea5a0e262f5209ebaf7a4656a1578f8eca8665d6dbec9d2293ba9f6810d4beea11cd3cfc844ece5669cf4f7101a6b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d86f756040010cb368961f6e067a05b1
SHA1eacb059a4342fad184a0cd3aa6082bead315ff96
SHA25653cc22c8b6f54c3e31dfbca531d1e7132dbdf4d216d531275cc8b21325b77a1e
SHA512c85096b1a6a07769af31c265199412cac29833f8062c32b47a5bf2b5a6405563a9476747b467e2655e5ff83187a293f193a483d4b6c4dddb43f8f5825b7b8c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547fcfbdb10a62058285b882f07efd5f3
SHA1df2a6f773514feba39d7bb08218fc0d033ef3274
SHA256c440c094fe09ce791e7e9aab33c233c755029015c7858d1ee076b515c06be490
SHA512c8fc36f54e57cc5e32910c714f190196b530c4502ff793d9b3f04e7aa3a337f833b9bbc2f802b2ca3036bf025de9c95a60076250c09cc9d8eed8db8ce0020790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5553b30e61cff56ed0c1e337ced8f4b02
SHA184fa5b72f152ec7213bcdfab3b63717bce28b915
SHA2565e3009fbab48c596314b80c0364bba393015fe9e8a165d871aa01d2973138f9a
SHA512ccb3a5e2bad55be700fed45c772063525bb9c3e6b697f78d910a1e90b3c5416fbebad17140449b64b5c954708d216476d03b32555df502c0650680dd5b781a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2357bed7de1adf8fc0c2c16058f6aca
SHA156c1e84cdefd7269b64415e4b3fea8526b350bb7
SHA256b50c4dc2c41bb8a884c6612c4fea1d3e4b08df813404ae6013a25369e6a24835
SHA5127415d1a23635d35e307b906b57e132a55250ce1c74cf2f52e67f0ab20b89030b8cdc9503576cae1208c55a272efbe7c79228b80ec00cba48bcda185588bf76ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5453bf2db249cbee8a05ad2b681cc4bc7
SHA1a4a4e62e96e7a090d96dddf7d9141fb9d120b297
SHA256ad095141b6c3ec4e8775d5c68d9ad60b7c81156f3351a5e8e9c16770c7bfde8a
SHA512c91ce7fc4ec634e9fbb6bf6ce2d3fd9d2dcf50f670d32dad03fce3c332e570cf3215a3d9ace2559160fb946ed9709d1a74c576db2a04b5e97031c9b164659c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5447ca01e37923fa75e4a12c8934bc1f1
SHA1715673a5495813f22f3724bf103bc09ac611f1cf
SHA2567e03cdc1765906ed7a54b1c00c04f6b1504514d6693e9a4f5f2660e25616081b
SHA512b41dfcc522abab604969ea21330a3eeb589b64210e6d8131623990eda8bdec11c9449248ee0c65db393aa4153c6cb0e2692053f351449a1f341ab3691ad387dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d14207800123afaa7143308668695f21
SHA1c473854de8f8f4a6725ce6f6154f0696fea8f305
SHA256f999ff9fec28edd2cf7c1fefce59c7f781fe499f56a30006fb8f473404c07846
SHA512cefb8483974c8420eaaffaa6780eb8c752d0f02ce0720d15375569f44dded6d27466bf05e02a3ffad526b8418ca9a0cddd3d9941b1b81e55668f9d1c7ef0c7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587160320b5044494d685a013cf1c46aa
SHA1cec5768bf73645840cdb066c51a9b811dad739a1
SHA256985076233db4a566cd5e3710c5d0b131479062594ca0ec995445aa3fa1e4236c
SHA5128522e1c62d0a6c8343e2630bdb5c1e25cbba78516605efb6f89c5083f4cb78a487437297d07660a5edeaa8a1497237ad249672b78f0ef815d8872937a7ab4cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594393fa990b654c85cea383c93c9f5ac
SHA1d4cf9e3dbc8043782a125583168aeb53be0e99b8
SHA256cdf7f06388048e2db35f628beb1b8883416e1401acce28a92c0fbf84e3b3e996
SHA512fbd4ffcd4badacbad63a39e7d20ec58d28780a4e7613cf67ea00af72af1c48f4a0d5a986b999616801de48d13c4fa1831cf121be1930c429cd33c550a7a03359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf1a085a0dfe998412aa03651dd69158
SHA117dadb08b50ec08125786f4421bee262a29d9fef
SHA256e3b174d0d86959366ecb6c7d5ec91e7a797c1cd2d3790650921645abc2afcf98
SHA512f68963c6006d6a58059f13c59285014fc0e503145aa3e041e9dcd2011d940e315013d7ea364d3edab2414eefa3c9719e0ed418313ae611b91227c44e5dd89fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9f178452ebd20ee7ae1cf0368de9978
SHA18058de135279f9435e7d44c679eaf55b5f49cdb0
SHA2564405a25ff30e5f61187927f0572fcc00708ce5647e493ffb209a39a7f57c2590
SHA512209b1692e705e7a12c93598ca54ed00fe8346ae0036e3cd58dd4978fae3b2a1de15c08b7b51f955db28c2ef6d992cc55ef5b51969209c90acf05caf74f7c23d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f92c0144450b325acbbdc0ec75dafc6
SHA11e1b9042032a343290d0987059471090275022f0
SHA25645b3f5231fcd532a54e3f57ac2af252e63db1109d73501d073f01c1c8806fa47
SHA5126e6dddc706a2969be5484b6153a9298e52bbd294a9f11baf903e774a67095b94c15db0b1982a1303c430a32a0ebd0fe8bb8650c61c94282d4b861a789190c4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5128f7405b1389351241fad4cf30bbda9
SHA147450c3a0fa4e2a30867937cf310f9b930e447c0
SHA2564024aa906d980e28c8228b7bc040a2f0a8e9ae71d2bbae810794cb202fd8d877
SHA512cc53e7f4eb2dae1ccab5588b2b4cb47a8580c98d90ef248205ada9fd7c8a054155b15387ec7f7968aa73f3a1df55a9932656942c10da861f7059999509405581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5244b65503efb0a0daba71058db364d0e
SHA170369a8bc5c82ba80dfbaa08fd27d3b4fa4af835
SHA25639fc2bf692023131e8296721a42be71a3d218cd89d878e44d66669d004101870
SHA512b8e760ae71a13b58d022c97bcd81b89b35b94825bfaf175af60d9b803c9c577c244a3f9e44b1e6e509a3e74123a0c2fd13bdabd3ea5eecc2f7a4c3b1aa3594a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8cc83c0106c9e6ce202000e060077d8
SHA1735e1628dafb1d954b4f6f344f1c40165c092891
SHA256c8b30c159d52d338d008935c3994fa222ea984e882ed85a866e36bcfd05261eb
SHA51212ee61a78a7928d4d413f9be849d805f2331066a7670a44d635cc6bb34b2aecde60a5cb16201b5a19d1092b459afd103dd4f02456e1d8f28bc07cbff5aaeab06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53472b971a51057411b8a7bbf2f61ef0b
SHA1213625fbbf0ae9a82405831c09ae32ca9c50ef9c
SHA25666ff75c54f3aa43d1d5fc10bfd65a85bc49229d159de0ba9434cbc85ec61679c
SHA512bde47f9a17ee8419f8c04ae9f7e4b6409cc94e6179a3ba75af6fb4d025b799e65a52ca793d3bb6acbaa4262a3751893f9af8b7f7957220349fbc9db650538266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52930664e6e9959f7351291cf9eb5c394
SHA1110c9b37f96f43abbf72e4227111b6a69667ff4d
SHA256dea98b7c2a9bb38e7e3de1c5eae96a3cef153ceda005ff8d9e2794522ec9c990
SHA5122f92067af39f727a45916b50b2bdb5f12d05299a7b4c15259000a800781d2ab51cecff11d337b909b70ac650c0ece865f631585e37c37d2ca766fdd4dd5bf3db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a