Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
353600297a8706a63848c82e263398c3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
353600297a8706a63848c82e263398c3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
353600297a8706a63848c82e263398c3_JaffaCakes118.html
-
Size
97KB
-
MD5
353600297a8706a63848c82e263398c3
-
SHA1
e53b9576e72dc3859167e7cc30555575163e7581
-
SHA256
4657484e8b06925a2bc5fce1a039bc9fb4999a08d38571d21172069b404e8d1e
-
SHA512
56140679d39ad970f804396a23044a17969022c742aa1096e67fb40210d2eded91c8bd5fe5094cc1f468145bbb59d4509a104ff11c95133eb0df6a1bdb4dca43
-
SSDEEP
1536:/ggpqpp0jBVdUVVVVVVzzSSOOyyy66IIKKGG8B8BxxxxxxxGGddttGaa22hhjjZE:/ggypD6Vx7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{011425D1-0FA9-11EF-9449-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106c66d8b5a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421602271" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000059aaae5bc1a300fd45ec71e47840749f3433a0dd1cfbebbe59a4cc1d82ed56c8000000000e800000000200002000000060022ea83952c5d47525a8f4f4152a32ecf1b3762f69e377d7f40a323b14c90120000000b2a73a55080880525cb10fa5f2e54a979996a55644f0a4a00ba3a2d41048e8c9400000009ad7569f1837b53636dde046e61991d7ff72bdfa898ddfe4420721f33e9bbcfd83b58798a4579beb6e7ca3092ea0de09fc0b00cad8400d05c6e91cbcf3f0f438 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2080 1736 iexplore.exe 28 PID 1736 wrote to memory of 2080 1736 iexplore.exe 28 PID 1736 wrote to memory of 2080 1736 iexplore.exe 28 PID 1736 wrote to memory of 2080 1736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\353600297a8706a63848c82e263398c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd37d791b91904dab8b8025fc87d7a51
SHA10999364f083b94af6a8af93e6f44d357d8e2ff6c
SHA256785b0062ecbdcf8f85f95f3378c5387df5fe610b54fc9443b7c4e9f75846c9ce
SHA5124295a5985eba34e9cf528211caa9f43d06fbf4e8b3028a776ba1f2a36873371a3a1aa629d4542552aeba1838a63aee1fe516402527d6f1863a3e1e02a3e53aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d74ddd6d09a887a25c224f533776ae10
SHA1941b21bb80b24aa26a098ed02eea1365b6876590
SHA2568cd0d7c280bc892e57efa35f45888c1d43e9b38a0f0a49d3865bf37c8e6dbd59
SHA5125308631bb6037ab4c3b3d9a8e4a49059345ee90acff33cff03808dd33b52e095a478656a9eb9f3654e323744c9133daeee783e85701390d6338d2730eeac8aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a54ca8d2350fafab55a21fa9ce31d026
SHA120fcc37f4c7d2bc847cb1e16c7f6a5e6e9da5b70
SHA256e3084f5c5ae9b088765598dfd3182d0405dc121db21725e4176ffcab6815dbfc
SHA5121b36e7b342c64367ab56c05a8df041d9dda420bb86f9ad03b3bf15ccc8ffc4ebcb28451e8c3b080d4b0ccbab86a3da60690188e57f61d05ad3e361f8cbaeff39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556e7051525efe56581acb08a2e5874c3
SHA15905e3e213c92e4ed647075f159c239949fa09f1
SHA256579010372a6200fcdf4237d764365257ea993cb60630ea044e3c8d79fbcf9eda
SHA51289503f651aadcefb105d9b015a2b2f6acbe3494ef8d9ebdd5be7f32af982bb9e47955acc9b5ab3835ba5db6d845951244557884d44023ddad434a3f6ff60ff43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c51ae6784c5ef2d347efe8133b46277
SHA10cb46ec65995711d3d76280cf9c33bd57c2ed943
SHA25681be6d605d464ce507b3d6e12a6396bdcdeffd3f796aa1fe78020ae5a3fbd43a
SHA512d6a1a4d3df51baa4149c125282b21b507d6c4f91fa824d7802d73bb67e28a70ddc7f78818a75821dd06881fbcf918406c519168d12cbd34f38ee18fb70d8351d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b157621acc721837551d682336d4ceb1
SHA11ce3e28d727b01fd93c9406a2e98eed9b5b06129
SHA256be6a90b981fb8db6fdcc33bdec5e886a56fe2b5fdaec9593b862b2375d9c0a3c
SHA5123f621c450d6227a36e875c36efd43a3d1062e38cfa9684e8ba395e231e3f6b6af4303c73962ef329d24f193529ac4a6b95052cfee0844b7745a4abd26cbafc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5567380796b0ff5e8fd992a7087aa9556
SHA11d61cc40d5f17649e0164bc2237060cb30a86598
SHA2561537baf4bafa66a08da8e426784197faae2f808ff2fa0d8c0922e7f4cca31ab0
SHA5123a2be9ef466ee269d22e110348de5ecf32bd5c58eaecca704bd494e3be316ce0fc9473c9ce8f2ac82b6be0b48f262618c94db76aadb82d584ec4b83ad487c48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8cd6e4bbd9127c4446985d0089a97f1
SHA10d533b59b4722df8a099edf89b051e928126f5af
SHA25676ee4c43d06e057ef48dffa7f81fded1642a8d0ccf803ead504899e9bee3f38a
SHA5125385278fb5779b406c61f0302bb5034d97e6b8e338931941b1e5742cc659f521629a3996a21502d0307c2efb8c2e7622e15b0b2234ecce61e7c62f88dadbbced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538ed5532313bd3c7ca4aaf4a35013e3b
SHA14ecd2ca0ef062e029eb4de1f44dd17acd4e7f1b9
SHA25675c6cffd13f9478a868a839d73176babe4e54594cc038ac0bdc49536c373bae8
SHA5126aed3eb1203574bb08efb49d11ede0418f2ec8b23f62c61ed1be640b79dc7346421fe343bcc07fc689f9219b36ef64c36ac29398dab5f46345f9e5cc2c2ec750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6b90d10e53ed51d8abaa2141a26c6fd
SHA1c76840b65ca4dbbe2132510c60550eef5f76c341
SHA256018c7185f39b54ea57c4d43c71402011cfa4a84353645d603f910ae204d1602c
SHA512a102dc91c0ae580c13c0442868e6abc2b42de65794838b2aef42e540c213ac021aaf18adf7038b00f8a1757c18c19cbd0f09ff0690fcffa46f57a84816a7b113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55196c42c59aaef4d8ac8b55c9fbd0567
SHA11dfd8c72528f3af494c1f336c733e8edcfdb2fa0
SHA25657f0b6911ce3291f7a01f779bac8c6ca48f43bc6421ebe82462d45f8e5fc8c9c
SHA51279046bbcef34ab8fd8ee7096766853b04037235c4578da8354a0302da625ac1dd1da68ce3c5f86204ce429576b262aa6976de4974e683682b765eab693d3544e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5489c52868db87e9988a323b113c62fc9
SHA170842bd57b5fb8a86cc33b858ff5da6815623202
SHA256578c61e3bc44d3ae9f5a65963b922645df021309bf0bb0985244f191ba95c3bb
SHA5122a2a41dff66738754a8274e01409d5f07ddd3a1ed693dcee74af23fcc059a0b125dd360c4f90ffe05661a469b8f3eea5611075a9154572b2c356d499301ceb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547e14f41b90d1f14787e7ffe99da40a4
SHA19b2047310c30804d84a3845aef908cc64800b091
SHA2561b621398ff4593de8db97558306ea3a043a9b5d5cc8794d9262e9630b36a842a
SHA512470b53ecb3c9e728ee3c5565c83eb3eacc8c6256bd5e33ef98d4961aeadcd6582ca73661c7f2604f9b5a130031b064eb42d9f8e154aac2607145e946ad272195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce5506f159d3f1c3644faf992fe43ca5
SHA12463be6d0873076d50ac197498a708d2ba249a22
SHA2567c58a2e20525562d8800903dc0598a76ee25e06e539166c9fbcb81761c773e57
SHA51283e4ed7235cf34c5af95d97ba5fe49ec9b11d326d75050687a6345e239f265c5d49503405026303605390e99f1cda0557ceab3a9f95b8bba0269eb2c27e98645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc95b56352892fb99cb60591431fab6c
SHA1e76cb87e3bce824425b0a9ef45132bf7df954473
SHA25637487d6f89bc3127dbb99bec90ce12d197b798e196b8776dcb0d9bc05a3a79e1
SHA5125ca63d4a00c62d125fafaafca0a65896b348f048efcf48f5843698c1f539ba03e7058e944ec3829b6fa8495157b11e8e7689380d0c1724a71489782413c6fa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a707df38a29ba65d42e89d54895b383e
SHA180a29034fe62c3180433b7174da2bc12192ca2b5
SHA25601184cfdc47c65457021b03d231c67b1d5fb30c0cf6e5f63131d63998e26c03e
SHA5125491bb746ee72b4628691266aebb6ec23e5de46c079ec9a033140b413cf67b0f9fbeee8bd74db937b31e34a2d0eabbc96b780dd352fcc0cb277cc8c6e1de939a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b010a3c52c8c006e2824a4f0518374c
SHA156f7c9e5d34c72e302b7734f939f67ee9ca6ddc0
SHA2561fe58cc149aab859ce86fb932ddc667c7720c6f519cc1fe1476da0d2621b9621
SHA5126c51df50a88fdee84c0610cce3f803d0bfd6265613bb73fc0b958af70c56d33aa41e7eac3382a2fefb44339298e149026eb6e56715dcb5317c095a4937b9c93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa1bdc710efa4b04baccbba22fb5e5e2
SHA1e86b4f2c03113cbdde364b899a3f281be5929c87
SHA25659affbd4b05773fc9379845275538aec507765d4069453c235abdf6cf54af4cc
SHA512af10f1cdcd21b596e87eb60856d8c85950490fc35f859a54dea8711bbf1dddd9ba14c0108eb4da18f4f45d9f670fdf85fff7fbedad58b838d4d5346e936311a9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a