Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
31f954065b648cfe5d8e61d63ebee718_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31f954065b648cfe5d8e61d63ebee718_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
31f954065b648cfe5d8e61d63ebee718_JaffaCakes118.html
-
Size
460KB
-
MD5
31f954065b648cfe5d8e61d63ebee718
-
SHA1
305b33a61c9a0f491afb0cf1f7bb4a6bddd1e7b5
-
SHA256
ff0c0bf4a92096284924e58e2abcfc5192448750c40d18111b05229861ffb31f
-
SHA512
519b10c6831638d7ad9135abfb9f21f5e8e7c5ed05da8e7cc95d5c3917d476b00881cf207cd0174e9de3b6a72b85019f12f9ec6c820d1cf962cdb18459ff5ffe
-
SSDEEP
6144:SCsMYod+X3oI+Y3sMYod+X3oI+YRsMYod+X3oI+YLsMYod+X3oI+YQ:75d+X3J5d+X375d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63226551-0F33-11EF-972F-E61A8C993A67} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000022548a2a44b2b73513fb30976a3e875e214c0d7370b12fcc756174d21472e575000000000e800000000200002000000093226b5ee6ac1fd838a251b8e414223ba9a2ac7c9562bcffd2b80d8f8b096b3d200000008b0dc916a5ced54b836dc2bdd38ae6a3e50564cff2140713016b92564dd69ef140000000dd0013798f478f74e9330f5aba94fd7900f5689cff0d5508209e7ededaef5d8d7d84dea2fbae1de871ea4a536a553b0c62d5d99b8c0d546745ddfb404bde611a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421551752" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1011a73b40a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2964 1940 iexplore.exe 28 PID 1940 wrote to memory of 2964 1940 iexplore.exe 28 PID 1940 wrote to memory of 2964 1940 iexplore.exe 28 PID 1940 wrote to memory of 2964 1940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31f954065b648cfe5d8e61d63ebee718_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5516befb009165fe13cd693484d49a2d3
SHA13fe93c2e75523b74ea9ee50577d18a983902ad81
SHA2564397d1da9c6d5444712951878aabcdee14a7a423f8ba3579a6be1e47742e5d79
SHA5122d9ab6f10eb779857af4ee65ee2dd3169540c6ffef4ef41271bc97a1ea08100a75212f34075eb897826e3b0c71ea1c67b84ecb24fba3af56c8740c4db858d473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5225d9e2fa68d1242ce665572342803b8
SHA10035b3725b8e014789202260ece4e116eb6c8c89
SHA25664b3f5e76264eb62b0eb8172766b717d75313c95e6dbdd5aa068de5a44169705
SHA51250d6ef9cb610087be55692df4a7036f3d057bee610f166d05d59e0182ff7ec35bb16ae4e5caf0b0295c077cc1973a80f76894ca7e8c6d0bb62264e6120f03dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f83818cc5f13eb079dd3559b97c14ae
SHA167f22d2605fd9b4fe700d1272a672fe47ff05437
SHA256e03f5df9dfab387bba8ed52b08fc4e32ffa608ebe4745aa5a92e95db6ed71a45
SHA512a6361c6e8624d51b2f5a8c2a4db7721955c8cac81eb9f9717273d6367403f5712c52c996cef998ee493dfc6c26b1c5021fa23db6d8df7b1f39abc71151e69088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53af0c93c7a57f4a645a6c6188c67116d
SHA1d7d157bd696f91d6da92e54d5ab1839d8310f72c
SHA25621b299912b9caaf0e42d4fc4a31dbad68bbdef5546e04b686577f0b95fd1e1cd
SHA512c8d8b412c38d71de0a982ca2512cfeb134221fe1ca4e387ba35b0f7028be50fc2332b4c50964b835d1fa2a156be1e2381f29748bd85c327b40a7b30b8624f2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eff639b68119ce7ec0323c6cc8333bc6
SHA1fe54a2fe23c38c5090c158e051350908bc862d8f
SHA25692ceaf0257702ba0ed9c6cfff83ae52a767b42becaba546947b172b86b9cb871
SHA512240174e6bd9317f2e0bec73f640335faf64710f7ccc739e8f67ea393dbe5c472876e5cd3b6081818a5440b315bda1d611dee5977b8fafcc210ac0b873af49c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567dcb83c6635e424abd9de67c3bd9554
SHA101db88328f158e62c2335384a1bba9d6d1e1fdd3
SHA256f5e3271335fcb8ace06b689ad668a6f5ff8f60cf0fd81988f9a73d51969271b7
SHA512e43bf6e18d6bffceacff5acdfd038ee1ed4320fc69700199dfa54a2ea2152130c61d1b5b23ed63c0e0f8f119fe7a047526498352d80b525ee6be9f33c846565d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3963e56e993c7c051cda274c52cc70c
SHA1c58068c3ecc01d9bbbf98cca8df0df9582e5e20c
SHA256e020e85ccee67b9d9be48ec186f0036e8d2a4f5049dbb526812dd0000d048422
SHA5120012802a3d0eedcaab5e23e93787e509d54d8c5e3117f3826fd989642a8c79760fe51bb1d968f699e718aa6322c25f6737c4013d65a96e26af91cc94d278cdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548a740bddcf48a5036e0ecbabfdde6aa
SHA1fdbf86490428d24d6d5499b8e6fbb89a68531fc2
SHA256508cba7f68975ee9f3e88ddbab585fa7dc130f7e327c403ee7fd89ef1267e32a
SHA51243d4eae7487d7fe8bd6297e8145d6c0ba377b9562657fb2bbd13f94ebe69aa80fadf65421aec9f30e18e4cc308d989ca0a2046a3d46afc1beba5f435e5f50f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5881830e84f8290194c9a814f0e6a1376
SHA1622ca9e45c775caea08773592f2098fa83f7f2ed
SHA256ebef60aa0346751381dbe80d21fa86ab72241d5d1998a548e9ec54d786c35b7f
SHA512d55561b9c0a06ff29cee98b450a8e57d3c3a072280a0c774d37d8da25cc1635eb7eb4dcc90a129f2bdc234b0f5b0d443ad6af7774446bf91e263ed338a02e8fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a779d1805e7645137ebd90c870bca36
SHA10d3673b834f47509628cf631176346dfd42c3b17
SHA25673e45e5d28bb7df57cd21ef78c9c2aeb5cc1c849ee82340caec2c67c5d61990f
SHA512b83338601acff8cf213e7f7f43ef0b054db374df94afd5064ee1552c3218bf36ff26469c9157e64c6ca02bb4fcde0115fb674c185af841303163dfd025cb5159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a13f9d24fdc78e6073be290de4dbf73
SHA1c51a39967ab59f269d1e249c31750db336cc4fcd
SHA2560feb44e78e853c2bac3374cedcfa877e8398ec618a33fb9aa8cc9f792618ba54
SHA512033c2ae468f5f91496862137c40ac290a4929624566287dbacb12c2a9eccf0d3ae4f700c6aaaae1edd5b7afb11ce2251d07f71fecad637df8eef5d8098cf3580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d69fcc577a2c07f4aa460e3cee0b1a79
SHA1dfebe39e2ea9e0d796e42bfc8aeecd56b52acf32
SHA256cc4e708669c33534451ac1f5f33a217238a2050e517d8e8c3eca5a0c5a058229
SHA51282bbe1524f691b5cb341b925966aa41df0b42d1807e89cd30a9addd00d339c62f3f2793a88946ecc954ee2bd499198a910eb0ba2e29bf86da5ed23a10802500c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2d76159b367f8565eb9446d7cdb1e35
SHA138e04d624538f72df2425bd2b90a5aee74b97e3d
SHA256f2f7d535e72642d7ef90e4966e262c18370843e5b8a672b886dd12be7f3d29f0
SHA51268baff3ca99bc781f1657cfe0bd7b92fc76b4bedb4487db5117a95e92e843799e40369b00067bdf763310de4cad4f84352270bb24b5a242f9d761522e3586ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d62afd74db274732446ac4792ba6bb07
SHA1db5e8cc9ce6a257f3a2a18a4337d6c708f46d22c
SHA2569076a88580849e7cd70aa4f1e4c382b940552eeb38aa1692661bcb80a3aaa641
SHA5126158a31f7c9c906ae22f051c08b9fce79b2d0190f0840f88fa8689cec1fe0e7aa15d846e38d16b29dbd306a5ccdbeb618d88c1a32e547f1ecfba02f02e7a90e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5688e9a57d507f297f201fcb79d6f56d9
SHA155f75bf8c2fba2c89421175ecc834d8e4ecca094
SHA2561e3778c027e60620815bdc2c7a724286513cfaa3208b23fb9c67386824cdc61d
SHA51234b554b2ce1f3f00403ee69c9220d4632b715326c108f3a34ee0ab44696e6ba64e74cb0b91b29c292ff15885b8dc87ecfd0375293dd273baf3d27ff464f5d3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ebbab74a3774df1a5863520346f5cdd
SHA1ed5971f484368e30d9dd8abfa22113d5b38b50bc
SHA2565dcc3b3fdea127315b1a31009a6f4160b28db3000cc9f0daadb5e27d7afcf525
SHA5123fc347406863947a4542ca1177c1e9978d2201180e1672be393ff358aa7831ba86dac01c33e6e8072568a43d7c2df82956aed9902ecfcc8a117bdaa003989056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5488457feb1aa1d0e0f921e6914091c25
SHA1229fa1a8f9ca5dc94a73e8fcc42180161928c93a
SHA256b7cb3b67bf26bf4b9a4daeb3fcec1f50b0e7bf6107762afa6e505bef52e45770
SHA512d675848d8811907c08433f0052e171e4f4cbbcd821112eab00c312e09911a5a55d4f00ead1a7b990953eda3b60316303ed7a449342d6264a334ef29b0a42d475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f646da00d238eaf23a419c3ec751b09d
SHA13e129bcd51dc0e7b9af1bc739f324cb78f8997c1
SHA256fad9d1d26d5589bae66b476dab8fedf4d2c3273474eb0fdfb540162413dd7462
SHA5127650eb34a475ca5039ec6fc00d6c27b5ac5bd709775a473a7ccd03dd4320224600f69e3397490986f66a7cf76c638486d808a0dcdbd6d3c1064589598539b33a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aca39e01a0d800166171a89f462363e
SHA1c981d0d69143d7df13d90df7a38fdc83df02c037
SHA256442317fd953d010486f2192519e30f6c3af4b3f392c8a0b944ceb9e030a00ddb
SHA51210505376269f0f0ba3e53f3908115301c5d43200541a5b8f6d2f3a3b966cc7f262b96e6f56385d54017b22ca058065d77c4ab7a4cc6696536a378799b40688ff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a