Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
31f4cfb81118ed489f62cacbe2d3dbd5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
31f4cfb81118ed489f62cacbe2d3dbd5_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
31f4cfb81118ed489f62cacbe2d3dbd5_JaffaCakes118.html
-
Size
8KB
-
MD5
31f4cfb81118ed489f62cacbe2d3dbd5
-
SHA1
b62066cafd746dff20ab625ef4a81999970e1892
-
SHA256
d553614f854b5f7c2f0bbb773300b6431af35f91c1b8f16bc3598eb07a6f6580
-
SHA512
07e1269c20f217b13433ee0fe087e3c958609d2311891f86dbedd4dc4f081e4d28333a1f781e3d035c9406abdc798f4885f651385c04637ba69cf388b6dc2789
-
SSDEEP
192:sx93m8MhBToCsRO9nJDfsZ1Wf/T1WsR8B:sb3NMb0CsRO9JDfsZ1WfL1WsR8B
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421551436" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e6d1783fa3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3CF3571-0F32-11EF-AF3D-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007a762c9079aba58a504524ebebbe08054dba31ea1c34994067477ee7d682aeb7000000000e8000000002000020000000da1b3cfc4dba1572c2700201f803cca479606230f15217df5c05433f61207961200000007abfa310ea4f27438cf27a3566ff1dc6fad9e399b3e73e8c7fd303a8832614d74000000042d1c4305487fb6965076020f2b9a837918e9506e172dd982eb8ead90d9103fec5c7eade8e693515e5f6682c3383c6f7d035de201a4a0944993c2f7bbc2dd772 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2348 1716 iexplore.exe 28 PID 1716 wrote to memory of 2348 1716 iexplore.exe 28 PID 1716 wrote to memory of 2348 1716 iexplore.exe 28 PID 1716 wrote to memory of 2348 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31f4cfb81118ed489f62cacbe2d3dbd5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d1c9231c987c09aef162c8542162a40
SHA11a367ea31929ae603aa48aad1a2b1796c3e53a84
SHA2561d46ee83e179967ec02f766cda564b5d040a8701e6732666ba486fd5ae2dee79
SHA5121ad0a86e40ba1b39763c0de46bbe80239282b3486f2ed57557fb6d3d0564bfe4783599349959d8539c040f0cf23450b56e288a94908917adb048e7cfeca1add8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f738c8302a185c88852e443e0c0318d2
SHA190a573027e6b9a0d5ab86bf45984eddfc8680c58
SHA25655441f45843487afb71619ac8df8ae134027d83e16fb9afc8bd09941c7bc1283
SHA512a4c16b716c3aa055ba588332c240d890ed026541dec2f1ae05651af42c85aaa756489cdcc38866a37a3bea77164bcb4fdecfca942abd41c5e68604f4ea07d91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8f6924e4b3e829eab7dc908a2c372c2
SHA17800a0dfd4954f3d6e185167dde900cb4969b0c4
SHA25655268a81f0c3027f3398d43eb7ef8cdb33cd305b3dcdbeb63610b500853bea1a
SHA512b99c05205f6e104aee1354f53d56d031be026210ef12b355684db11da6d9138e2f7a2097f88373b3cb3e2f2e2a085b1bf0a9b1776ed4f043217065e0d41ceb83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b24b57e6591ef04a12297d9b58e7efec
SHA1632585f50d9946ccc9e33d6b17ccdc592f6cbaa3
SHA256a0c1009509e00ae605e157679e741ef782f8ecd733d8a6ae68855de1aa6dd373
SHA5120632c8b307a9ae5f202cffda09546a190ad9fce2f4c49b14b1d93ae79235b4ed77d54a0531dbb9390474209c93e0a3475915a149d4d0f07eef9a0594721e8987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58429e3478088a09adb22834d55d583ea
SHA1de9d4ae51b8d54352c1035b5f4047c4930af68c2
SHA2567ff76d6644790183d6345f7d81b75728c6ec457ddd7f71066ed240ba4ab27cfb
SHA512a45d16dc89e1aab6fa1c965239b99b40372b531060c5234aeb8be2963bce52e6b5f75bd96faaf9bbf3b18b9ab74a51bc3c5ca40de97464ee613dbc8d21082e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55218c4fa0887b3dee46ddc3040fd9766
SHA16b4a1802bc3ca4e590df0614fae8dd48ecffe3ff
SHA256b3ce1af2a6deb707d5da2d3c186664560975fcecbc366b3a68d2d99818e1ffa8
SHA5122d182627b17ebb6ab57e19613c8cc1fed0f1a1988190996e1f8b4cf328816cf597b235f3a27c5be31422b2d3ed36458e4847b341215816a50ae98984d4a6fdea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566ee34f345553a25c809a6367832f6b3
SHA1b0ee30175ca7ac93b3531e404c541d37e6631cd6
SHA2565263cdb4c7922c38813ba0a448387288449081d998644d25e63ac0fa1d875a46
SHA512fd24c1f63808dd0f7c3faa5a386e0cb7544db0a203f648b7e5406c4e1ca8f7949914bebbccefb7091c72f4d665db69e3410bc2fcf397a8f85d22f40092ad485f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50126055774d2681f96bcf6a129484ff3
SHA109783e9f353869118db2147a267284d3914887e8
SHA25672188470c932c74ec3e4834da319bfabbb112de3fd406ec34e499406611055c1
SHA512059170b04bed3abab30b7208127f988d394610f0d5e5d19e78e5a9851ba1e7b31e2d376591626c0ce80fe9cd82c3ef772ac07ae8f82ff014e99082d5a11c7e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5753b6a983d34e5b1c5a7670b3f3e5fe8
SHA1dac6c4532e74ea124b9d34536710e0dddf85b207
SHA256180750aadf1db81fa3ebe2e05d42f9d35a500368843d89ae3ae79b7b410ed62e
SHA5121d83d339d057a29311527260fbee90d6ff2b9d297f1006f22f8b1c3235a7fc811c0a727ecff64e785c1a6d60a0b558002ffd5c9d1b88653333a0130d3f6f6d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53055e18e7d0ad74dcd811cc4ee0752f2
SHA12ccd1669ae869b1981011c6cdd45b745945bf4ab
SHA25620650fc980512b5b7b211c1429e0696c2bb05dd780b994f312f6c0b807cf4987
SHA512b608af9b302bfea4834dc671292301540feeb07fdc09b9e7bc63b94f73650e481053a7a8ced78710ef6986b2583f42ebd91288bd8af1fe78eb925218a9ea9f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e65454a9d91c1b48922811dd4db120a
SHA137e8cafbc763d6539f1a6468802831a243553c17
SHA256ed6fa18848d03d2baf3025b06b8bf6a163f6925c2c9737c279492edda4338958
SHA512ed09a8c44a8ace711a545f5e2f0dc97f558ae1f9dbb385e14b0056f71bc02f4071194417a74e526720a47c4c6d9e759d5af6f0219a023cd2d4b31c8caaab1e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d025af72628a92b7385ecadef9205b73
SHA199be66495f9d7187e72f0ca1164491956718fe6d
SHA25674c47758856cf169f701962e0f7263b2c2e73b7484fe04f736097c89c4d3cebb
SHA512c0f37a92e0bd19a49522161179b04bd42b6b14a2b7f43d8a47df9aa839a7485285410ca8d88200df311d55cddb32fa900e775f4d7206d7555dc7ac1124f2ae62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af3913e21a3ac2285e1a2d0c6cc38d4b
SHA1d6210af6576b29d9c0d18a2a592567b284cf6d45
SHA256d78ede98adc733d2edd5debaf68dafbb9c0179d66c5a7584ba188f4b14b2cb92
SHA5126f67b446947cacbb9a41318125d02055f62da4c1137c51107c7d0163489f38c05217f8ac09b33991e182146972df73792a1a85bc07d52937dd10fcfbc8f3d42e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a