Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
33fa2aa681ea5464f3c9e9d7b4c09959_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
33fa2aa681ea5464f3c9e9d7b4c09959_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
33fa2aa681ea5464f3c9e9d7b4c09959_JaffaCakes118.html
-
Size
459KB
-
MD5
33fa2aa681ea5464f3c9e9d7b4c09959
-
SHA1
2864e1e0fbe4d94470c8a7e0c27fc3936fb470aa
-
SHA256
32879d65d87fe9036b6bccd1d85762cee22e870cda26500e36f241bacfdea378
-
SHA512
f82942bddc4c313b40ddee7271cbdb2a9ae6a7ae1b1ebe784fc1b3d1cc986cebdaebee1a9c23814e638b82b5e3d3d273b1b934ed0c14edd49738ea7963e39c82
-
SSDEEP
6144:S0sMYod+X3oI+YqsMYod+X3oI+YQsMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3m5d+X3w5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421582870" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005a6db9aed68d2624600f1c657494df449a96af4caf9a27742eb57af24c555caf000000000e8000000002000020000000607dac6e80837ef5fc581a72d3066824366d5b5fd212c8639d56af255a8f335090000000043c98a3f7f937f0c7b3bdfa56a91f8b1234050c3c87c0734ec20693d8a8e9e228248860ae44004cb7fe817cbbcc10fb8c2b365f313fab20f8ff0759a42fd7b7978b3ce1554ba68d89c6aba4f0cdc6773e03a7ae9318bea8d1cf80c6f564c2cebd3709a6ca256e784610171aacdd61f1e1102923094888e73239dbb5d1499fdfad777cf4e6274ccf30ccdbd90ac4e1fc40000000e422f1c5d7b4b0c402bc638baca2d0a39ceb94787946793b9c68f17d433c932b198135c17b8d2f436e78a641762927ff884f996dbb8d43c4c96ec65cfc5e884a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000007686b03e9e0410cd4e379f0f677b0e9c41417a2442da2af0248a4e36d3a7acea000000000e80000000020000200000006b85a8bdfa9d298cf7f763f4521c571f74861a76248bb8d6041a7427a041568720000000b619b20985cd232cee3554dca0dc8b45f5d2d8768aed4804f073764aee7113c440000000b9854c4accc308a8598d934c6bd3185932aca7f36fe7f1d35583b3a0fee26d53ce293b7521ca8b5f413ad5dc37c84366a44d77f0f81477c875fe6f5ef4e91f63 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01074af88a3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6F31681-0F7B-11EF-8FA5-CE57F181EBEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2536 1644 iexplore.exe 28 PID 1644 wrote to memory of 2536 1644 iexplore.exe 28 PID 1644 wrote to memory of 2536 1644 iexplore.exe 28 PID 1644 wrote to memory of 2536 1644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33fa2aa681ea5464f3c9e9d7b4c09959_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7ed6ca0f9b6fe168e53d3a4f74ae862
SHA1abdb09bdb6841361872bea4045f5eef686a5ee89
SHA256a2de9d70be70b73ae6d574b3ff9b81715215d303f5e4e2bd4667cd681c274ea2
SHA512e7c9106dd6de96afdd1ba6b81bf4aea3714fc214ad6efb17e41495d25acb971825cf908462928b4b1495533b84c759627b1b34f2f3a695834228d6032062f005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c90d27b73481cb066195b65ad8f4755
SHA14fe541658d4b48c86a90d19cc16ed17475f7e659
SHA25699ea26e59bcfabfe324d2599653e2d27ecabb3d351482a47068c17e67d212e71
SHA5120b76a3e3f4be13681c0d9f72717e22a200e1a9ab75a3c86186e15e4edebc9c9f76a84e7fc04baa2ec91402ccf6f1acf3d1f4220d4ae5adb883ba1aa02aa9dd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db29c60b71a27d99ff14e1f685ec7808
SHA192e452ad38837946ad43cc6bf089689c898740e4
SHA2568e88c16451e8d4f0d55a9fa9631c445e2e3e00db05310dc255a38309ef0bad93
SHA5121c835ff499b5f93c9559e74d3fafb63c49249bc5931b6fffb7d9c7a37673120c6739092b0b4111212329afd489f173933e8f550bd89fb78d2429e320e61a21e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d65a8bf2390125c00d287ba96cbeb8
SHA1823694c1acdcdc14eba7d773c1b4cf2415784504
SHA25639d66b4502f9ead3f2ab3942c94077e5ec936d0761c5a244b6b946d6553c03fc
SHA5127a083ea8db019aff70b4b32ec05f7e609f67b496eeedd75565b77f06eb5a55067f4ee30edb5fc653b0cbbedfb04d9c1c3121d60d1778a8162212a84f556e03a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a8ea5df55a493c2c9a7d48ee48249a6
SHA1619b2a6f4d54314c281c82ceb44f2f74e753136a
SHA2564a873edddce7dbad24e8249f89bb9d8800acf8f513af80682ce3919100e93eed
SHA512bd84af7f3d30ac357c3095f76062fa74e507f6464312e052b9003f1ae860f0f082c48a6e3f8dfd3a91b8a5c63e6b7166374cced91facc70d877023dcb73fbcf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cafa2db7057243e2a3031e027fdcea6
SHA13b8f2646dd6347904c92420f9650632bda4b4182
SHA25651946b5f45f99e9451ad2807eb0d68cdc861efa70a239565f8e3bf1f879184da
SHA512d956f4aa090312af464151486592fef26ccc1a5c8d42cb0c2b40d091059216fc7f8d2f2c15604380c36d7ee41c378f3fb1e48b294a3c1930179d51297c979722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57167f905605d6c90b6d11fb3872e8d9e
SHA16ee26c45b11897c3edd1a1ca29bd871915ace702
SHA2568aae53918175582440349529b7544ca2b893c46df8fac0217054206174c0c0df
SHA5125e2406537ed8b4424829cfc80778b69fd7f1f888af898de5031008b916c632e5973954a602215f467827b2e47149c0451a544c2319b413274b0d4e275480448c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56050d9c150063ec4e20298c33f01eb8f
SHA1d5c2522f621e27ba809762a41ebb91419f6ff03e
SHA256798247320cf211608c48aef380ee0de6ef2570d77a8796c63154972aed66c3cd
SHA512e21a2db011f55e5c4c6f31c7b53e5056ecb6764b5ada5c8ae09a0f220443bec3c963a8081f28bf6fa5d360823e4327a7f56a509842c184319597a14727d58ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b12ce9e1b17d9fb82fc9a8e31d4c580d
SHA193efa145a312850096c50017442d25fbcd9e8ccc
SHA256b852874880a4b4878f563f98e2026bba9349ba149196a1743878911946bde3d0
SHA512521131e81f7bca2071f8591ee8c13b058e4fd3649241919b49855743d46443384c8fc5ff2b4ffc64a22a8806000844d1caf7521fb1cb5a58ca8b95abf4108a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50404b8824b16165923ee1a6ec18918e4
SHA124eee42b166876a1452d5500cff6fb56d30d0e47
SHA256d48ecf9afbc70c4303a6040e3daa2baa70f39e5c8b2eef4f3dd8b7a4b4e0770f
SHA512f3b0a4d2cb90c22002f7d939b5ac3310b85569a0ae2db3869a60ac75b263acedc9e947786ad29de6fdcac7e4dbe536fb37153739bddab6c8d5160a5e1616dc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526bad11a7887e152ac6beb7a0ed436da
SHA169e634ea0f18c760bf2a197677aff1881bf5dab0
SHA256c7f41aab69fb20611fb1cffdc01ac36836156f49b0237b1850896c9eb233f67a
SHA5122904878cbd8e2ddb144e9cd374b3293698a21470aaaffb3673ed05233d1b161e1e160b58362fce67ba3c5989be923b90dcbff176913a82076962334e64c7db0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58659ffb2e2fd1765c343dbc2fd3dc50b
SHA14f796bc51c1d1a949eff3435de75a31f984d54db
SHA25621841ad5831b99e5e95302bb403057c2524406464dca8bf93982bb3bf77e3054
SHA5126dd5f7ce1b8c7ab61f74240988881245212779dd8a4b76cf243fd51ecc4988855c4961e8323605a811dbb2bc2335279b4aeb38de196f97fd13ca4c01cdf3f910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f436a99090c8eca852e3aaf5d836afb
SHA1c53b4b1ee9ef1e50029ea80ec9b8e4af95db9afe
SHA256048b00f76fb95208d1478690e78582402cb1fda0018d2b35a913baea22648f30
SHA512b1cb22adf4569e8f654933d02b1b97cf6dd025e1f1959ea22b9add3852ac2c3497c3675082cd5f17aef6b7d6f83735ab18bce77bf3091b630d90a7c34f6f9367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7163844eccd83b080495046e42f4942
SHA12a9034e6ecaec4b983105b9c84767c39fb1f5444
SHA256d8f790523e9725e0df4e28097471785a0a5c6865c6569617b0401346ced5f68f
SHA512a2abdcd2d80b696490aebca0efa77721c2fb97d9b51427bcebd4c2dcbb5b114cd859dc1e3368795868289d2794695232feb522a6dd4e12414e64770b164f68c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cad12796026245499587e5a971328d19
SHA1453800fd68156c05330da5a8a51b4b8aa34447aa
SHA256b4e521b6195a933c3f3104ff2fd63b92d8024363c7d315ab466109edb5885cdb
SHA5125caae08626cdf50f49b6f802d4c50f81e4b0ad4b2a2b761ba5a84ec6be5426678aff53089cb6e2dbcecb884bd46392870d39b15df252562acbe946c63e146730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb6a3f0a680e6f0b2b82463da65ee102
SHA199be3741595db10d4a0793dcbaa62bc7ebd16139
SHA25607a68e1f29d8a59186e1ec3d75f7be41884e04159013c0001cb7f0f911a0a107
SHA51294e5942f401c6dd75b68de3ea8dc8632f827d12aa2e5028af2d046e041d6036bd87605c570a47650c77a052b2a46f8e5a53a6fe64f4a2a19296165501f0a64f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8f5c974d0dd9af41edeea4cf8478ca8
SHA11e16116016677295acf279e9ea65797297115d1e
SHA256e8e0634d0be6f00ee48e17082f7ef8a9ad6ea605f55ac1ae58f9a61425d7262d
SHA512eb1aa392fe4a421ccf2eedc572e8ff4b1d6a648f1b1c85be192cc319b079ec66e5870f5f2d188ce4580acadcd62e5630a42d0279248a39dcdb8f2348299b8db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50300e012858706326c47d1205c36930f
SHA1e5ea917b161293468cd6f9b9a80869d18571eea3
SHA256759e9514f2659ffecb0ec34e898ba7b574430158fcb4f8f140e77c67542e99ed
SHA5127953490be5b6781552d1116f0ff7c0c7f82fc6b5919615b38453a9e03ef6dcb307b7bfea77b3a689f10b4fa2bb3df7d0e1989fe98e43c89aaabd1ea4f6716afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e9f9e334b425df1be27bc468d3e6433
SHA1786d90855e04633e5592ea70ff93dac8fcd25c90
SHA256ff3dd66ceac5a9463a4e44d54a38bf0801df2c0091c9e8957ca4f7e68b60e01b
SHA5123a16b72c8a1c72f8bdf5c3cdb7e815d4a7be08a4f83b73a1526bbb618b163d51a724a7006ffde4c0e68767eb4146539e0f77c9fe1e9b288dde9a1b817489655c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a