Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
31c56380aa0f6eff648034d3c2d98b22_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
31c56380aa0f6eff648034d3c2d98b22_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
31c56380aa0f6eff648034d3c2d98b22_JaffaCakes118.html
-
Size
88KB
-
MD5
31c56380aa0f6eff648034d3c2d98b22
-
SHA1
51f34fdb5e60d0de85fe147d4ea5283e12740552
-
SHA256
01ba0c2bf60a5a747e81dab21f83cdce0fed78fdd8bb0cb179cf8fec1ceb3c4f
-
SHA512
52ab231555071d27d3b648c88b72933bf7cd70649f0b1a3c5a7dcf571446f898af06e5cb1a09f0a38d27bc644c1b3357c1a93760b9edc9d6c36fc1bc081aea69
-
SSDEEP
1536:xaIhqhGiRmST0e0/VfgRQaca1kHl3u76RDEYLB1xYxjx85sFNasgdiiIqQ:xaIghGicSRQaKHls6RDEYLB1xYxjx82X
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000004250cf2a67e50de0ab276e83074911399af1741e65e6e02bfca340c7894ce533000000000e80000000020000200000005f5914e1b48cb69cc0b9861240505bb8607f22cbeb96e0372c07fd14efcdb70120000000eaddf1e65fa3f598c0dce2f825261d836e57bbbc7d233f2ce3c8b872b1876ebb400000007e964a094a000bbbd507234bec5a2bf32c07ea6e807a74cefdb288278bb47fc20ef3969a08b3a8751ea90e65d07bdffbb867f1e335b6c71d68de78e6f192ceb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43DEB061-0F2C-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421548694" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8099771a39a3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2264 1732 iexplore.exe 28 PID 1732 wrote to memory of 2264 1732 iexplore.exe 28 PID 1732 wrote to memory of 2264 1732 iexplore.exe 28 PID 1732 wrote to memory of 2264 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31c56380aa0f6eff648034d3c2d98b22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bde0194deb9f01f9f18c0423121e017a
SHA19ddd3d15dda72efe6ae0ff261d8bde4e6f0c5aa1
SHA256590b337c77a9b566543b90110164250fcbead213ed2a5075459a2cbb09bab37b
SHA51237fca5482e29992db6fcc39bc2c9a4eef81c75465134559a1382b3bae7a9b2764aa7fcae5968f80bb138f8c4bb55b8a1cf6dc92a2b3f4eec015c8fd76940098d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5734448f604245d3fa336ecaee933d580
SHA17a8d4c2d99c498ae9617da7ca3e882092df7d568
SHA2562f36dd7848387e515691175d229be403390f09924a15b4efc612745692df3bed
SHA512fe11f77f49bf42f951e9789c796c1ed10fa94f01b78feee1c28f35dc11dbbc628b53070eb8991d005cce4396c20ad3763a69b1f580df57fdc743126b6d4103ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e51ab9ffc871268ac015f36d20abe0ce
SHA1c26710a5990e90cd0f3f09cf6f0840ce55aa9ab1
SHA256d7750b73f2475b700b24cc063d80354eff97a54377226907b6a433ebc5e36c12
SHA5122dd0632c434f9d445b1fae7715fef97e736eb8d4306f2b565219151877616b5dec0f43f45ec3077e1cebe6d08c7e567cc78eb55f1f955c062cd6713cd5638a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9cb6594f326a25b1d58313dccecaed9
SHA1a40d0fc155440db2b6e930da93bbdbf466209b5f
SHA25682026038d7a1dd635dba29cc2fbfeab928277861bd81ba7198d55c600dcce6bf
SHA512ddf3b05bd68d16bb51e266e58298595f0c067fac3ea1e4a82887ce8844d7610c36db4688b6e9f8b049c5a532c24ab19f0f3f10f3ccf73e87eb216be4ebb56a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ca5b9997e3835ed509b461c5b3bd187
SHA17091fc2a50753a66f34cb18d4dd28a16bad31f56
SHA25679b488bb454ecd488f4a93437495bcf056cfd4ce64fea4839baba04fa94eaf0d
SHA512c5eace6abeedea25d9f539e9b6eeaac8c8712585890c6a32a1c63f747cc2fd838247165596ec4cb04bc74a951135e750ad8d8b81d57c522d630b643c1c4a5ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515bea0c1ac44f668cddf4af30a6eb96b
SHA19d7f4fc8cb84f7d9124c7b65e04757ce89901f25
SHA256e847d6c4f70aa18a08d89a2b365a3c9646dba4c66c084c1d77e268f05affaa58
SHA512917cbf299747f99d6a24ee392b97223c8a76a1e0fe54637d13806ea5af6c70b3d0e6f65157d7f3b404fe646ee84012d4659e5db82fe410873600e034de246d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b4991d42349337d861e97ff56993f51
SHA1b5f55ba6554a500515a29e235a7ac543b90a9f09
SHA256142799f41b46d3b264c06f2c8ae2595c0773590588e7fa6c0219e373c20f1d87
SHA512d2aa3be5cc836c59515b5f1929cfac94b965f95cfb8e7d7781e9cd81219932fab2af4513b0af9fcc6a156467ff6e987c2679e42c973b51881661749139ed39b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bf375f5c15553b7a0fb6fdde9b82e66
SHA14d6cb193cf01dd6cc96b22feba6f58be2a739695
SHA256f54705efe7b67380a99cdd95f4bf003f2ac506a804e052a8a48b3a41d77d9732
SHA5125bd01bdebe317898d3ea1ba062010db6acfaaf8d015b99997c75bddcc4b3c924fb25bcb9325c4b160b2286f26072424ae1f22eb5afb563d31999745a28ae4504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551a9da45b69efeda2dc8d0dd3840931b
SHA1eb4a11a8fcfe1246be5bca8d6620a3b1bbc4f93a
SHA256a16a1fdff65e1f3aa130fe825f889fb2d7b246ec3415e2f64732cd333476a6af
SHA512c9d389d22b9199de23f8b90f5950ef1612a7af350d18ed60afc35615e8c823007a428f37cc035c2f4796e3ccba7f9fdf096918ed13b15a4901eb67d122f67c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59006f6330c0e63e5b239782649512fe1
SHA14dde76674e7887c6d87c905e98ec9a7aeed967db
SHA2565bddfcd0ab32a645191742ff9a29a9005e7d4d6aa0f417591952c1754a6aed83
SHA512b2e54b11d17e9ad42225b09ce18b3f0a58d1915d40c4d857a8637043db77a455209dcef8d01ee9445fd9065a75d28ba516467222afecb0cee0f651a619356fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a7071891f358b6e430e1ce04a9756d
SHA1d1d5f8d0a92368fae798b93b9f7459ae1a6a25af
SHA2565e82cb25e0517856440f9a6304fcb7e096713436ed6210c8124f51a51b537f84
SHA5128f14429f9da3b4beaf756411650929823f883e5bb312b256650e5a8ea23646e87b056226ea71f79426f16662bf6db0ce667ccad1db65fd32e9022f55c97f55c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5884ef62f99aaa3bdd83f6bde741bb63b
SHA1c27831b4738ee614440ae911551440a28d94c4cd
SHA256b7999ef7aaba9155186d10326e0fd703caed0319ce3b85e89e1c34de2dc90deb
SHA51291d16efdff7cd8d2ea669d74b263ad7e4ed41fb8078ec19ff59c5783491f0e1d50ec39be86ef3c29f7fb90fe923f97647822775c49126ce2248028ce57d33f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b3a64e9580bf81b7327c00c1f0d67c6
SHA1052b1625f4d28d5186e6808ecfe45fcd50ee545e
SHA256bd3eacd107bb715e6372d43c829861e45ca8568186e5d2ddc927b13ab6846598
SHA5122bf3e1ceb6ade1968b6262f8179637fcb58298d2618ab7cf1d43492ad34d75f331fd45051846eefcbc8e74271260603b03d116407bc760b79477cb340b12c94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a235292dd4169c519037cdcf3d2396f
SHA13a53bd158ca2a9f5ec2a04e8bbd30c779b83f91a
SHA256ee1e6f6ca62dd9d8d65eb8dcb204a50d39927fa30021b96f9106e90d964e8434
SHA5124adaf73e4c87dc3cc7b110d7f9555ce1e6cf6cea85d707eeed2ff442ed0989e6bc6892ec32b7117e364689f8f6cb2ea90c8fa6914d7bd92637a9b35e7594343c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170507c0472dbe16672def6eeb467f06
SHA18dd4cbcb110e4be74b69872c314514b5e1b90174
SHA25643f20f8df89875cb482b6348fde1800f3467bcf55b751ff6eaa9e01b66898c88
SHA512007b90e1d411b5aa2c35713b0e48bb710cc2efa5fa3f6bb3020f017186a4c3c95cac5c017330059f540b8afd1e96c19310998e38aa637973f1b790c0e02b8a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b3fd4c6b59cfbcdf96e983652e833fe
SHA17dd7f9e03aa12ba9c95bf8e0d3e48bf6f264e2bd
SHA2563b2983b0d80888db8bac0064927b22134bb79968edb95030bc2e15d6bc1e2ff9
SHA512f72c0be9d8f4b5dd8003e7d1533745cffd6b04d5db47e34ed692f9530e16f872d4904b8fa7036ea08507c4a0856a518f236cfee061f3aa5e727a6da80eaa3864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a2319d30c709992551137f7162fdf8a
SHA173c8d00a2580e95f5ac6d2dd849b8478069ea277
SHA256e3ce3c16d7c551c43340e8f1f2915322fe41c965ad9e44aa0ef4749d4721d8e8
SHA51239ee62d76dc33a47d86b79cb30008a993a15e88f6fc898ec4a03ff3ffb3a9d652a6a62916f4cfdf280b0533cc8a7bea41caecd4599953d5ee2a65e4d9e1a9c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be50b2025ac14d459047d7de2712ce33
SHA10377cd00f689756f1c1391b3d6e7c8a415920678
SHA25656c333cf777656c61fcc5c568e8571492c3dbcdc0f61e4007182cdbbaee9b836
SHA512ce1f4628a14728d1741ee1314d5a34f76002f889c891dedb9e2c885fd169f99091f07c76d132d1861016721336cb2748077629af4eec781f95929a893b12191e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5331fb8ce4433797f4c6ccc7e3b2e8ee1
SHA1aad02cba7af83c5dd75ae7a72f54b8e44cfd73b5
SHA256badbc90a1ce3ffa47f352f0d4430fff37f52f279f57b552da9b626b63b559daa
SHA5124553cd05a2f75a0a0a66c00853d7d69bf528a336449c9e445d5585411a004ae01f48da388dbc77c83bad7f5b3168dfe71ab49ff42fa70b63fa8375d070174291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542277ba282e1cb193163473af308c65c
SHA1fb5aa42427bb9f1473861177b3543d19809b84fd
SHA256b5995e5dcc0a6ea2a0efc862a4998fb95db41610b6b592a41f867b78dbb810ee
SHA512287be5e1f25aa87d10fd2208fd007301127cbc6b3cdb2b1829392900ce9675887a6fb9e40ef958797e7180d6539ce274fbf6c113e216044267d1507c92ed047d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a