Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
33d21d936cb9adc53356096824a98742_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
33d21d936cb9adc53356096824a98742_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
33d21d936cb9adc53356096824a98742_JaffaCakes118.html
-
Size
4KB
-
MD5
33d21d936cb9adc53356096824a98742
-
SHA1
52ff8e1a8b772899ca097545b838ae3b6620dd8c
-
SHA256
c5f701ebcea83a1348bd7b18755570883deac53d8c36414abb2d234375d96d32
-
SHA512
82d7d4a24302b32909e71737ef17b32057876e714145904a78df0ef6df5da21f256a73dd2ba6ed4a4e1672cc98e4dad6c846000faa4b2ebf674cc62ba3a4a670
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRgF6d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000293ed2b2a19012ec24810ffb6ccd516d6118c88e68d30b7f96faa3ba92bdb703000000000e8000000002000020000000748ac8cf2bdb9d28516bfd7816d34ff976107239c4aeb48a1fc54e6ec5c470c7200000006aba16fe91ebb413b4f0af991017f4ec145a3f8f8661079cada1427da2ba3bcb40000000e103484fd46ac2b60b231ab52147a215abde5b1bba89e778ce24ec87c2f1eca845a360f175dc450f871357ee3f0a2099813ab82c80d5fcfbcdda15fef71ad340 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421580310" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E10AE2C1-0F75-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20cf8ab582a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2944 2100 iexplore.exe 28 PID 2100 wrote to memory of 2944 2100 iexplore.exe 28 PID 2100 wrote to memory of 2944 2100 iexplore.exe 28 PID 2100 wrote to memory of 2944 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33d21d936cb9adc53356096824a98742_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eca8ff51065c8c0abd5e328ab027b4c3
SHA1912249295c593544af750336d67012b81c91eabb
SHA25660e565a89fd8c7597a4158731fe4df2c7f69b1e2d044a4b0ad1dd93f0517d89a
SHA512cab70e5111a9233bd01d09bf0efed587722d7a63602c78bf98a3832854a324a147fbe241d0ce07120a84754ae563d9ab5fec88d1ce7f09b1c57d686f91e5c327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d625eb0677bf2612fde72c8ded5a66f4
SHA1f3ba28d8f3cf7ac1f8c9a6d6ee31221bfa1a6865
SHA2568fb2cae0c788bacdef20bec9e55c4fc4d6a17fee32494833d9aecfda04d52b0b
SHA512609997c182def406620839eec7cebced48de8fbb0436a5a7ab7b4e62f86843290e7e74c954d6a783d52b1a081439a2ad5290de452160a8317813ffc4413a6ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544dc7deba675ff517575aad4d2f3edb4
SHA1815d1a852825a0ef89848ad40dab3b62d918bac5
SHA256f72f1d2ccf11d8e34dde2c2559a0f2c0a71e3a524f0bdbcf72654d49c6b8fa51
SHA5125320d93e04f5b5f5b18675fe91dd1cf3498413a7a1596c00f81d4085571b25d9f761b95594983d1040445c032ab0bb42c658937a073bcd0f95b19b6e5ab0ff93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5139400fc60a5da484198e697b8ea355f
SHA180d253d1ad7ffa631717f1a1a27910125796fb73
SHA25648407dfda030e7b8e303c83aebea30c38e8ec63a271a8ce74d2b577b35795e75
SHA5120bdf4b4de4403969bacd984e3c8e270922d85e1369b53068fd0a22966fb308ea84e2ede1c0588e10c85ccb586df81fc68fde292c08b9a55738c194315e74f580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597377624e9fdfa83153ca7a5b5182de5
SHA156d8175d7f8cef33862ee91530c704752cc29ac6
SHA25696c074b0eda976027943f2d103ccfa0f3706caa121e43562d3484c81592f4796
SHA51203f400fba99959de1dddadbaca3a34d782dd5a98af3f984c273e8231928bb5e28365143478be8c236adbc75e35e361e2b17766eec1d9e9ad721977d21ecd43f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55208707da3e5bb5eac37bf0b0895952f
SHA1ace757a75172fab9bc53d6f61394ba53e656f3c4
SHA2566f1661d7f0a852b084f480adf87638e18c4948272c26e241c5ed8df17055d25e
SHA512bdbedaa35a97aba3e45fea99671dc1f82cf3c9bc57fc4a22ee70cce3d6e899470ae85849658dfef2a1f13d42c3c0969417e289a5754b8095a48581ca6002b871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a0c8db37e1d43018b7d2b1a04cfd74
SHA1f848d25a08a3a7e406d78f86bdcea98e005f69f8
SHA25633a8d924f10906cbe9705ad98af8e203489eb978de311694c36187e40fe18174
SHA512d02a78f16f988078603377688e2b68d16774cab1fc3fb8de42937f3ff3ec97a607a6945dc393a6ee74f21c9ae8ae3cbffb0a47a68161d272b24053c8cb9ad6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f0fc02ccc542c1dd62499ed6286fa31
SHA18d7f11fd4da5312fef72a68d6d630c9a248f6290
SHA2562798d238d83932286cfdf887f9b8b55ac34508deaa7b63e99ecf3e6d3f46d7b6
SHA512c9faad9e18d5e3de82170a0e100a131a1dc09cb344102ad68a0a3de0dd8bc9eb4c69c4808ab4265911a07661a4f6094784477cf33681772263957db18ad8d84e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170c323dd85a90aa2cec937040229f30
SHA163c10e5d6f5898b9388286d9bba9cb01ec98050e
SHA25607b16c9a495664349f01bf05d8cde04f8ffb8e1567f0b35a4925cea74ca7b578
SHA5125adeb56b6e0f255e7d8e325502ed44bc8d34531b0f8473f13e14c07a3e58968d39f1e19f19082788749458b91827c3da7ebc09a5c0e205326927fb86f58619f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514a37eeed12cf5289f14946af98a2a1f
SHA1b5846a577fbaee633d6f5f6ecb6321f7d11d3c8e
SHA2568d7e30deefdf99309144e3de4c6b4b02ccac22a4ab3e9b8908c14bab0f3f636a
SHA512178f8b082f0a4367b5beeb2c3260883652566d261d9c8ae5cbae6c0b0ad535afa86e84c199efd8a0c8696830315b4673e553ee664886a88f6af9902f444d0d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570cce08115ee15e64dd683ea1d12749e
SHA16e6d51e1cb998748b5bc37ccace248c268405af5
SHA256770562f69ca908e2c0d5744b2a1d3193f21be4a431f75e4bd4d7e2d64355c305
SHA512b01b397a07f3c2f4e969a185510960f7cac6f0afd9acd4475662b3919566848bb5ad72a141d8291d710fc13c605f1da193ce89f6faafc9a3099c178928ea73ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5593f497db8504a8a20d9c3abc7a5a1e3
SHA1e73f2ff873a2f156b03fc905c9c342b0b3177619
SHA256aa957ee4add6e4986451d7c470347fbcfa0642a8494f0c0cb2aa787bf0eed4f7
SHA5129449c8b3b710528e2a55e0322242ed4058ffe5605a354b673aae09e8c1ac32074d5951d7b2ce7685e33aa113c8347a210c4727222a72ddbaeb9a777a98a6c62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547cbe30e478021104f0dd41fafd10611
SHA1d1feb78f4648901d20d938a041f4b573a2a966ac
SHA2560a2d51381f4594e89e84fed7495c45c63a219535f74915a7e8b97db69bbe4897
SHA512e487d70f1e295b28b8d8343392862d02a5f9b1f18ce680b27d1f85cd1f49a5facd9cc91bfb4df830ea287f9ebe241906c69ca0016e830913e9885eedcb95d610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f7aed4e12fb37b3e1c2d2871a9daffc
SHA1afeb9c7896490ea96cdb2ef06321da12e042051f
SHA256af9c77dc9b9fa6a59da3e4c8af7fff3fb77eda44dd8dc6882fe5a83aee011549
SHA512a55c071f30ca7e42c79e9ccab06e12682a4b8554a3a019f490469da5b73702acfbe7190db42283142474c2c2cdd5d4719e4e8d0c005916530837867c5660d818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fbfdb56c4c639c90f60ef580b3cfb0d
SHA139a1dc13c7323a44ea540978e55b8f3f2716a791
SHA25608310407d138fade9ee59f2a7769ecefb1e58885865c79c04e163a554573348e
SHA512e3342d42e24ba5b5f29f0c82d742447840f58de34d7ef380526d4efa248d196243aac67436a3d57be95b713f043646191c6a98f5f111606928eb577315cff002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ea1106fc95a1aec13a4bb1c55b59a60
SHA127df97ec80f9397110904676eb67b79cb85a5ddb
SHA25628aadf70515ca2a9e60bb6ca0ca20ffc05a1cdea7145596b0d9a72b6281502e9
SHA512ce979ac31a35340e1f80be16fb3bcf001d8f47b162508e02fb1758776f8b8e8ca50b9a6d1868ff7d4563aac0e0ea7a979c99722157602bfc7f56fb5953c93ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525df9d3e1da1288333fb3706d4785747
SHA1617f0238caec3f2be0184643a6646c7ae5b252e4
SHA25631663b60c7710bd3bffeb358c07d26faa8e26a83432349bcbcfe498b087c0fce
SHA5127311150d71c4d0928e85a367c8b4c184fad3b860db1ba924f0e624323980004d908350aa6231751ccb64ccd4eb0718068157a57e7863a3950997c46fdef41970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b8059d823110f88071c63a077039cea
SHA18fdbeac713491837879759d4165ccac49c8e07a6
SHA256cae0da77a9aad98d39a6c5cd711a010c696b5befb28606c9dc9f03d5e6e0567a
SHA512950059b3b5bfd071b0cc23432d5eec044f0ea671e1889ce4c715f183138db13625c6e81b1f7f11709e0cb83a8b5032db0b5763823741a9a13c807d0ee173c5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518836626b6499bfb1f450ceb71819e37
SHA1f324c4e78607ea2fa9325522a088f1c7c0789c6a
SHA256f0f5b33e2bd352aa57905af86876410647f4cf709f9271be388122345cfced1c
SHA51251e7413f58e719cde5ae291940877ea92db5285433a810f16c3b7b5c975ef9e1f99a083bef75062904392ff29fb13c0b1e40e34cbf833412274ba5baca5a14cc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a