Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
34a5082600c5ba4d7e32fe1258a275fb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34a5082600c5ba4d7e32fe1258a275fb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
34a5082600c5ba4d7e32fe1258a275fb_JaffaCakes118.html
-
Size
9KB
-
MD5
34a5082600c5ba4d7e32fe1258a275fb
-
SHA1
2e1a2342d8b0e91620e1c439d0cfb09fd37e63ec
-
SHA256
6a741e5b57aec1843816d98dc72c0aa6e1e13b8e4ffc27a9efd790f02eb77941
-
SHA512
9ed27cdc08e92182fcf53f0a790c022173512752d61803f24bf7231267d0d8ed542fb3ce2e577309d16c407c9b65fba8f41f1c112cf7f152b58bfe5468b508e6
-
SSDEEP
192:PcvIivztuoTiJtkH0kO/C/bKE3t1+EaO4l7tOvWDDJJ1Nvko2g:0vDvztgJtfkOext1baOk7tO8TvR
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421593323" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000004a104a3d306f9b1a13ff51b7af91e984bc1efb3106da2bba6be34598aa6631ad000000000e8000000002000020000000d343b926529b52a91ccb5f8d128719d916959561e3ab6c4d81d592343978178c20000000dfaa17aae8657d53f0e8c632911739d8cda583bc09d252ef720a915eb27922724000000032275df99188122a3859d1d1a7f164cbf3416812513d5701c3c480909e6ea1809d923d92fd676d6ae1dde322ada111df68dc2b267006e9f3fa8810224943b7ee iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70165201a1a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CD29771-0F94-11EF-873B-52ADCDCA366E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000068d6997a999486638e9448862137ab4fad9b1e65c8919c2b314c916d975119d5000000000e8000000002000020000000c4702a9cacaad123829b9f735cd6a770579cd822e1cb1e5eaebf30bcdc006458900000004888bb78788db66cbbfb62411af59265c19f7f1f18bfc49549a1084e40186cdec3899ca5787256a4d3d820a4537c33a6dfcee177eb5f9df7b754e37a0b5cb4cdf198856fe515e0a0a3ab1b4c6731eef40b740357d38319788885105ad759106f6df5e5fd89d6ab29d6237c898b6f7b0c8e61d9bc408f8682b87bf492bdc98c54647fd6e238020d0ee3442d61c6bc79ab40000000b32969d6a45f7336389368ce0f470c8915c2abe1cd6ac44a14930b74688f690cb0f657048e9a345e0434a3ecdaeac11a88ca31f0a7e9ebea250fe2fab56e97a8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2340 2856 iexplore.exe 28 PID 2856 wrote to memory of 2340 2856 iexplore.exe 28 PID 2856 wrote to memory of 2340 2856 iexplore.exe 28 PID 2856 wrote to memory of 2340 2856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34a5082600c5ba4d7e32fe1258a275fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582f0574d9b6f350bbdc2a103a96c11b6
SHA1759c8f1c2d9e00394ecd5ede04091aec2b1cab5c
SHA256a6d8e5905d5b2997aa20ec9985c4ff7e2c9dfa8385eaebd9d3d12d467cc6f844
SHA5124d5819274f2a97f75c5ae9f1fc1ac299fb4b4be994c91c87fd7c44bda91394f3ec0c593d5d962519c914d8fead9a82b5f430c53bc56b2dfa35c50e21c5150fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54824c2af25a5da0f39494cebab0fe6a8
SHA12623ceaba50f5168250b833c639c4f9352cd9642
SHA2568949049d94d1f1cdbdc8a9a4f772b22816c4ccf08490347a70d1e8238c0cc5cc
SHA5126c749a2f107195109f4b6a7570b853724584d19761c248946091fc66cf8a2cd14c6b2d17c9d8a3a806b7cdf25c36e3395622b066a1d967bc39a6fcaa40566547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c90b2c2d33baf0ae2b34dbf87dc93b6
SHA1bf26c9f99fe6eebf1284b07c9ad7836fbf04d46e
SHA256c46be83c01a5fdd50319287e590b4190dac5768bd349f46fa4289cec2e262a18
SHA512220c510b59f124a5b067b10f54442fc73f676962ae2f06870758d7af35217d14cb08d83806141042b77322b76e0bbbabfcece2b58bb0134cf8a6cd4bb6ee39c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54828807d4aa188178d5d6b02bcaace6d
SHA15c71c5addf2af5191969efe0be7e119db873b1ef
SHA25633280d0aeeb32158ffb3ae0ac6c14db3a11b6a61c004c4cb7db8f8e738c3d644
SHA5123654ae0e14b85757a1e7270ae312706bfda5ae5e2c4ae25042d96303d4efd78e06b8839dd668cfea093535b8839ef3822f12c72c7511b451940bf334a090053d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb7185c3ac77af491fd767119decf836
SHA1b1167d6576d9607d06f89f50863122c8aa67c90e
SHA256b2ffb675fa7685d6f8fb3c108ae833b2971a66fc3cd3b6c36c81788b92caff11
SHA512b5b4d743df2ae4dc4d3309a522fb7c7a6ded67f415367cc42e320a200971144db373a8067e31c3959e5660c31cd7839021892eea64491a55436d77ebf78bff16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a99deae97ba09256fa675332aab3b7
SHA150a4e90e04b4e2e00fd2c703c22206b654fb3712
SHA2562ea0c52f70f7e6b91310a42dbbe824b0d134d551839ddd2166a55492559fd24b
SHA512165bb7ef1142d7c2151bfcd9ead019f607076c7e866aa0b9d3b027725aae5aca88d1c7097db904ff0d2004b227b09abc9efdf40761b92b79dde13f5021062626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf41159612f43e05a4ac5fbe0cac747a
SHA14884ba179b42c2fce6c9cba78e3755a518db562f
SHA256d4cfaa93ba40b3c833bacac258bd7efd4c06099940cde7986e06f21684ecfe1d
SHA51292a49b293f6d86856955bff4553e84caad4fdece28170894ac509d2aefb6f2df1577bb9f01e9a29c049307ed911fdf083365b8ac1723680ce9c4cd3c021b37c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c8d68bebd6e04e089b0b5870eb3fd11
SHA1c48a18445d406d7843468d15e4ce8959412bc80a
SHA2562409980e1288f69a59e83655f2fb352629ae57ce7c14adda99e6bc0d235e0fc8
SHA5129f50781dc3c46f8e3708102490b6bf4e74d55e84107f809ccc604881bdf39710d905e36fd8efe2265fd53be395e65785c259b35486532fca4c6ad6534c0eb7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c996fb8779bff6343b49530e81b5eb53
SHA15909505610a09908da4bbe695939eeb1248eea27
SHA25648197a7c278995e8c8f759f3310d3ab5f78839da7f968975600f87c972e12681
SHA512019d588750b5c36090ae3d2764106c0e3e4187da5342d81362184dc6a0c71406f0354b14dcf515d5edcf66cccbd4b15b6b76740cbd3a29ad1be33a5bf3049bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbf54f819f56f97ed9925181b3435f44
SHA1182d408a217a3047dec54f51dab13ef412a5c260
SHA256081bf287ef39a778ad0f8d3663c205699fa6323e4f396d86ef81365f9c8b040e
SHA51246dcb07a112063653e115ea1bd413bdafc6904622b38d9c4a9cc3eb2412d4f030a49b6a18babda30f38decb90fcc278ae031558b2d7e3a656cd1bb88bef900c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560902d79e139320b4ae7f4f6dc9296a6
SHA1811dbc80af9890ec5b98633d3ab002ac65411537
SHA2563520b70cfe7542eca6b3ce3a74dbdd6193afcac44d52e78d670a555778b83c8f
SHA512aafac173a57fcbfee08372262e16d3ff17a832180bd00cf0e2b7e3a1b9f5fdb45c085beda1c4183085d813c693bce459daa0f3ee633de32412457ce66d5cfca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50daf9867b68aaceb19936f0055ea4c37
SHA133353d34ca9ce62be9f06a88eb91ec09393c2cf4
SHA256dfb1a8af7117759bfbec6f9a5b2dd1c587570adf98bab3e48bffa758fa07b198
SHA51295e58cec22953e43ce7ff21a6f665734be995b3f875853b50ab3ddc239d3c13822d1627d8d64418355069b1036507eb74376afa09a59bab02729e8d3d232256a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aab0ef65be95b5bcc10cb40c5132186
SHA115a2793a8e9fa61be883c11c62d677f9b3599c67
SHA256034d64a5bab785b84d7c2096c90de30becac21054e69eef91db9cf1b71f2938d
SHA512dba2b2541586a7b82dfda500b8a7a0b23ee5aed2bda5688abb35db34923bb63890b96d99ddeb95076561777a92e30ac7a2391be689bef91f7b727f4ab62981d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bfbcc0934b7669bde328c20d3a583cd
SHA1b7609ad75ee5d69e1163b1f2f3a14dacf3a05d0b
SHA2560515b8effba75251e4dedeb005e59c6c40d6f1abaad1f47b953fb3e8e649ef09
SHA5126395fb33739488d1217c36ed96f14911eb6dafe8e335857f6bb63337d64d42a77549135f7700e7205a8e7ac1b0b22dc20be54e96def84c26230a893e4a93bc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56081cfad9ad4967602d0a95cd72bb2c9
SHA1634d472e145b98ed15ae411b85e69b869c98661f
SHA25640dafb84c9a3086349192763779278b9d51d4809bfd8e152b072fff6a7274fd4
SHA512f26986d30332dac7303faf6cf3d3bb2fea05506dfa427dc61c789656fd87a5bde79eab47c2c240d1f571dac954724b7b8087cc5c8851e966874e694b6da942af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5983ce18ddcf60e5d4a64a84ef9fae024
SHA1f232742e8d0b91e4ad1d853af6ead51ceff1911a
SHA256135adfdefbd8214e65981946c07baebbb9cbd01fd48f0c3d4624c34eeb1564d7
SHA5128c5d7ba7be7cb6c775ff3a9cfa5d890382e9adea48115e31e8442122e80a36bed48afcef6e041eefc82f57f025ceda1e1a8b85cb1f3689a4ff72d001de3641c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8c6d4fff8330ea33f86d48bf53e762a
SHA19849db4fdce6a2e1dfa46e9d4b52c70ade2bddf0
SHA256244539fa38c3817f9941b43391b6d682fee656596c4e874d9262d14ca07e1f9d
SHA512c073f0370c88428dac3afb1f5d66dd179e28224bf9c8cc33cf4208bba07e1b500039a87f1b3a31871d86fcd65cd1e9791447cd4df4a6b28b8d60caf2fa0ac541
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a