Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
34236bb4c7b2c1f243e1e9415fd67027_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
34236bb4c7b2c1f243e1e9415fd67027_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
34236bb4c7b2c1f243e1e9415fd67027_JaffaCakes118.html
-
Size
462KB
-
MD5
34236bb4c7b2c1f243e1e9415fd67027
-
SHA1
9ed6de6e9a6f6b0db4fe8036fd16bb6569893a40
-
SHA256
3a85888c0e79d8d8825351798118da29a4202166a45c92bdcfd5bede5a25871f
-
SHA512
fca5e298b7d9959233a821d55c98cb5b8508d1ea11126478264e87196e16abf28102b77dd44a9c069e123acec3cc78aa90c48bf40feaadc1d2a515d9500acc52
-
SSDEEP
6144:SJsMYod+X3oI+YNcsMYod+X3oI+YOsMYod+X3oI+YLsMYod+X3oI+YQ:c5d+X3e5d+X365d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ee66d48ea3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421585509" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBE83E11-0F81-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008e6cc9643655455fcf05194e25a6efcdaf212bb5f564fda2549a6edb4faf2363000000000e80000000020000200000001fdfff5db48a2dea44a351a60b2db3749bdef9644dd513ea93cc799a3a36b3db20000000ac3a9f81f276e8088528f745a09181fd9ec98e19590361ad63102a36290c1dc4400000006e21f99d72a9852efb937bd9d8f514692d2d6ec23eea1d25f2ab00ea0aa9d83759dd684c4a66f3c83496bb2db9b319d9d87e8ee00e6d124465d698c3980c3c4a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3028 1632 iexplore.exe 28 PID 1632 wrote to memory of 3028 1632 iexplore.exe 28 PID 1632 wrote to memory of 3028 1632 iexplore.exe 28 PID 1632 wrote to memory of 3028 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34236bb4c7b2c1f243e1e9415fd67027_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124314452279432a0a7c7ab12cd32caf
SHA1c660e935b012c645369cdffb394b15ad377dd157
SHA25680d8b64447fa40601b471fc6b546a03335218dcf302b86834ba42e8584e4e4a4
SHA51244bd90e1e41faf817646e65929127136b8154722ac96f882e0b7f2ee5a9de6196e817a33185d232fcfd02e3657db0e3ba6ba6c73e9457f55f70582d29d6f446c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5e2290c7fa8d101930e65deeef3d387
SHA10338382e4fca885da187bf5f6fe61eb497a32f5d
SHA25614f3168947211e4e317467aecab7f8553b5f31d351d8a9112de0ae2a41277e60
SHA5123d9008c948f86f4400b031a67b74b3e132261499e4df6e650eeb57b96b469418b5a1e7961c0c95aedd6666a9789cc0a65aa590c5e9aa50e0e99dac73ad959f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5175b8038761af100240cec8d7a93a136
SHA1a8a89ab640e41f7c5e0294f9185abf65939005d6
SHA256fdf60427b5f418b9085fc89a8e0460f78ac0062a19520d8ad74f9a0b315fd786
SHA512f24bf671b32c907f507cc822ca3f7b4eb89b3c7a34d26c325903b232f41b3aff35a8a1567acf8617b270c6b82adff7a40c033150232c26d3a9ccc6255bc29e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd37a6fb4166c8525fd821f58572cfc7
SHA16d602cf87c245ba86be770519b6129e9a1bc6f1f
SHA256184fd8e4f584950e3726b1c95bb9eebbb587d357c9fb75b19510bb8e08978311
SHA51260671043487ea9a8e385955dcc3396e72877584f70452a3fff758e627c962d95590ce366b4e4fc0bbaf01b153b156f5d72428f4e046161e67d7ff91bb31006a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f465e060ee7c37f20e0e8c06f4a2e64
SHA17bdc3b5c1905ddf42ef128c1b696e66843955e2b
SHA2561419edf8ad409029263fc40fd9415e2da5d6707412b2ac1af3226e2d510b732b
SHA512a54fc42d267d36d74461c30eeede0fca39ce0611341119a38ae91f6dea302eff53a3ff5df2f24f3a01864c66829e8c012a5fc1b5521c1076440ac42b69bd5aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce448476964eea495ed9f250f6dbd546
SHA1e2e742ad1cab2dbd1d809078f483514ef9ca2ad7
SHA2562c2a8bc99a55e77efb21116df5dec5a61c5e702314021987c4bc81dc9eed369e
SHA512b95094149ac8b3870bf455d47f17dfd41601a3d20fbb1093766a07a90c54f5f3f7050d7665fb1ee6dcb86b0046e32ea78dad4c1dd642d22bffcf393c5698c5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5058270b2ae6f7559cd1e2342e8e65064
SHA1c64bedb790850dd923e0f4ac7c4ff166f34eb5b6
SHA2567b5b6c83d3ff3db6384b8c3e6eb793e69a3fbf449abf3c9071b704b5325a6ab6
SHA5120b2f1a19a44a7cad4f647f02e5a3159c0f8fb08fb06fb8f639e19bf0ebe9cf7ac29e0dabfd21a87729328cec7a5c23d5ac9c17431c073e76972e64f4b9348281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b68474296c940206f25c833010176b3f
SHA181e9292bab27c08cd6448b27b2b0044cb6b0efd4
SHA2568cb0a70196712fcf246ddea533fd5c00ddb735bfc93de9d42371e769df9805ae
SHA5128029ca7273418e0e270ea7cfc9b8437f3eaa01c40e0e5e32670fb751f93c521f6094c83ffc593024010c9b900fb462998da11c1ee2a3f54c686daf8822ae76ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57322aac9c28dae6cc23b81c1b137ea73
SHA13e6fefc15d9864af93ba469126c76d1fbc15b89d
SHA256bb697cb9b22ee416c4ca681adc90273c19691b0b4f980a175a1a59477927fbf1
SHA5126fafb30c1922bc8695a865cb4393d307ed017a10c89fb97956b75741342752d17f661aaaa2774a709595d4b30477a8f3ab931bb72b8beca2a3d6a45d291480e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5867ba24afcb62700f4c9aab3fd9369fb
SHA1c5b1d1b7524284e735f14fff535b25764ff59114
SHA256fe34eb5b0ea2972da91416bbadb58debc4a7608f8fa97f562aac2d1070118fad
SHA512208247cb3adfe30a96370a42170c96d81990f49bd6b3b46f3504caf5510ef966499d53bbb6a92a96d3924dd5decb2332e138b7a65797ecebcb5de7e0a17ff74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f302da360c40e6707ee447baec82c6f7
SHA1b9ab739989f4afedab5458fc67c641c32a90b74d
SHA25668dd48fe016587f6f0c8773a51f2061ea7e1c554397c0e7c8cc9130ef0e8bc15
SHA512085b09b04906b8ea7a1dead1fb448dd07c1209cb0b99d03d1b09394738d58c7c511922bc0d789e8879a0008d80c9f92d142550b652c8b0cce5d84a31639515d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58175dba8bc12529f13cb1a836c4b5e37
SHA14afbe8649d065e2099e9787e7cbbe70f847b134c
SHA256bc10dbca067b3c6d028da1aed84a7d62c2606ca7f5d53c7e55844a03f7f0f6cc
SHA512aedcd978d8de08b097f90f130b0d7af0600fd208ef06a61fc94e8d7f0dad8bf80e311f91320fde5d6a8e7abd2d0350533990238a3473defa3a4868d5c01a0e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36579d777f8f72595c6f65dee98ffc0
SHA118d36899aea9a128d6acbaf3ed4a40e4da5e0957
SHA256c24ec006da981431ded512dfa8c93bc75bf0928de2dfff4cbc8d977cb7a4bfcf
SHA512386ce890908affeb52819698b7e97d7391276e053360a2081299aa9b1dbe4bdf655d0cf1cfd7b2ec39a86fda465b856f45c090d37bd02a20b3f0ea8e3de158a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5580377a369a9fedf4634f543e03f4b59
SHA13098f4af3071542866a03e259f05ff7f1821dccd
SHA256d8f6bfb3f3140853d37eed709a1962dbadf5d743a77c6d740340f849d1753ea3
SHA5123ec276ae4d04c25a58973aab081af2acfd7cf2dcb1b7174f9cc41823abad5bbfe2d97baabed21b797a33e144ea4139887727f10288b72f32b65361482f4cb44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5923d607bf38dd61a913fd3fdfa913922
SHA1b6a5932df1f7625b249f582356a7b7c0af8769c0
SHA25615e8c555a781ed88d31c8244a615a8efc67b3341ae961438339f3de7dfef5e45
SHA5125d2153a648a8a0d16fd7ca28263ccd12ded36ddd9b84749da2b5576b3a9c0d40acad9b37facd67d539117483c6a721f74640ae6c057e4bd74d53909656fedbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f73c164a4bb22033619ddcd755f0a00d
SHA1ee093ba1f6721829d61666cca339a964ab9e6b3e
SHA256b50c682da1ee42b31731749a20420bc0010eec25a61da2912814d62359d6680b
SHA51271e365c92ad7d550c89a1774ba189d546740e8c50a7f0f13da48568c1835839d605cbba263af2a95b1768f1242ec1d9d399687a4e5b4b94a1506703309e6614c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f83039badb16f51fa08563ea8a9688e
SHA1dd01c3b6716e0fe1482a8db9f9c5f41a3dd5118e
SHA256bfa57e71192e758e8e2367c76ef678de555b6fb4fbc348e43ee3120e261f6408
SHA5126f68665b32901c644bf10fa846a5735ffbdf074b0d57747dd9e511ac1ca697ec0a0875a50965684b041ffaadf21c024607670332ad89a95d796da6c3200c138a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b662de253394e109a97cdb91159e1529
SHA18a5e45d5a31c2c0a462a3f828f00b48f29c5298f
SHA256b7e5b42dbe55717ce923d99b50f43db459bbed8626c4a5838c74e2596a6d83ea
SHA51237a4d4a3bcb3c20e3ebe9b6705faa6f465d199c1600411813f6ef3e153949ec32186dbb20b3614c3ed000789b554fa2b8492f33e9705f728691c27ca7269b3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a56828698e86a6dce1bc58d049ea6587
SHA168095f7ce23fe418daac260e159df26f9c9a1a43
SHA256d2e01f87df4af12a40c2bf776ab56b8e4bca37d1f7cdad1dfb63489a3b63f4c4
SHA5120eeb056fe5d467075f2cad29e93ad3a473622e573381b74dc3255f791fdefcfb0b2f668214b0e6ff07dd504bece90bf343e1634e847e434862f31ca567f9b01b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a