Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
359899830348e7282e385a05d7d49576_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
359899830348e7282e385a05d7d49576_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
359899830348e7282e385a05d7d49576_JaffaCakes118.html
-
Size
3KB
-
MD5
359899830348e7282e385a05d7d49576
-
SHA1
59d20a4b4633a3d2119824dc21a2475f0ba26def
-
SHA256
502ca36ffd4ff921db079bf974529a337c879963f2a861cd9a117a2a6bdd5391
-
SHA512
3abac5b34de8dc83c0fe69687330b341cb854f95a44793ecd6652c79d9ea14200e22d80110a299d965ab657807d6e5c95a72a1ce3b3b3d694d89007b244c1dc8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000027ac8199aaa0efbfa816a0aab1805c229d11e30caadd8e4ff2c215711024ec5c000000000e8000000002000020000000082d40f636ae9054c3d54042c583ff6bf6af14d855eb35829259b65bc55f3455200000003a4b18771386b0f24457fd09f3d91cc7b84927c282cf7affd06411a7879ebb61400000001025255dacab740099e5d5df057bd62a6801062a1c92d3a1d0e07ffe50899b0129956b31e2360e5ea9328bb2ae588a44e31d8d5fed87f72a5cba46365f922fb5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FFE4CD01-0FB6-11EF-AE43-7A4B76010719} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dc91d4c3a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421608280" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2936 1668 iexplore.exe 28 PID 1668 wrote to memory of 2936 1668 iexplore.exe 28 PID 1668 wrote to memory of 2936 1668 iexplore.exe 28 PID 1668 wrote to memory of 2936 1668 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\359899830348e7282e385a05d7d49576_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c50f4a523a35fb29536944fbd111c0e5
SHA10f0186e4f8a85c59a8fa05c7b96cbf321c7bb168
SHA2562a1d2662ae13d633eeec74365cf7a370ffdf921f0f16f13dd7ddb0e6dfa28d8f
SHA51294415101429b6b62bacf937b92ac67b381b2288f8f2ad1ea90b40bef81c9f2af7348507d543c2a977a829c34630b43e9852bb1e8ff1a93e779d846774605d8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506ee87993f0d4091c5f6b1c5fafcc806
SHA1315c76eaceff9d0a435aaeef4224e32b5e7214f2
SHA256cf3c575a70063be74660ca194b66ac8f32bd36e979b941fe816d0db74bfef58a
SHA5126adf231a97cbc33091fccc5d34b14665e418db75a26b3afa1e9db8e4b4bd8a4cb03a0555d6b8fe1e5ac1424b41fa0644202ec80930f5c4771d8828a88271d2c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560d9f7f47446aebf98b419f403c0cf16
SHA153659ff3a0b6bfb0219eb144e439c48a57a69612
SHA256faddc45f6f89cf8e5bfdc5fbbfea15d07003db4719bdeb7755783661786392a0
SHA512e209564634e9edf719e5509994876c009e9d13e49515a34ab94649348e7d8e8dca527035097c181c9292ff6ce8fa4d9dfdc8570b2717ff6a7717fb66c0777608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cef01a5f32c4450642a3af1a890844a8
SHA1ae236541dafc43f50c8c57f152a6282061e98a25
SHA256a0571d33f339f27b1d6fa424bf9f4f9bf3d100dc096279a6b47831dd8cebfe52
SHA512a72dcda0a58c0bdd025ff64e4e85319e860aa7bf9bb095814f3312c7be1f532482df6ead1405207163a0a0a6436eeefc44e42df70edea77fcd9bb678ad4025ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b555ad9c1721b3e815007849c77380ea
SHA186ac3ddd58b85039fcbeee635cb414ab77386c2c
SHA256fe0d2c1ecd0f8b3965730e0ba624f31c30e6a8acc7907d3a08623be99fae927c
SHA51235bb3b464ab7abe5b2131cfeb4187813fecb444ceabeaaf6fe44abc6d131cfa883a58fc87c44fdf2b5391a75ced82677ddeed3b8fc5cd4915976d94ed4cdc490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5811b18be1efb14ae6489b470fdab81c0
SHA1272712d21afe021219471ef2163b27af5d4c8889
SHA2564c50dd6fb3ef7172412cda263506ef1093d39bd3d77730a77f02e8613a11f3d1
SHA5128e4b9c86ca79b499266054d540df74c07eaf95085e456219c4178e26b05ac1089c8f0011533136c7ca74cadd70d7f0fa39d57f00f5c04a61ea765ddc29d45a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a8dab2fd7363cde0a14319b29cf7a51
SHA1ca3f812b729dc2b5f655523df6bf2a3e480d53a9
SHA25618b6bc5aae0dfd35d3b8f89693e7da4e98f6962fef73faef5893f037bceafbb9
SHA51247edb1765547879e19c87d618ffd7ca3eedbd5ee39db66a6dc01d5f21c0c0feceb4b3064637ea71ec892922574f8d6718a5651f3235591a850dd9920e4a3b3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a1a0757ce2b85b5fa7c03e9da99a2aa
SHA1416d43562a673cac238a1dc483b875e2a3455aa9
SHA256120f08c6ebc1178d0674e0d386e644035cd9b1ba2489e833d5377bbaf1950725
SHA5121e50d5b4f084c7216c1b507036ed00d8d952e6f9b5613e1c5dd1091967a702fc5da2d3e86a9c5db32961487d661e0e629234d0c08b50ebe10d5ecc894af8fbb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ede4b33031950cf50638d9bca05fa7
SHA1e92a876fd5b28c5492d7d1facdc02ed977c58784
SHA2561cf2b50fe36d7dcc3118534a7a3c7200c7578c2d4dde06cdad29383b1d8db279
SHA51247430239776f3037eda74e3cf99fc477bb196443dacafab93e3383f5332e7ab62aa0b6fd517bc9a584f525b66706720efe7be59725fd21767dd62d7b50ce4d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5160cba44ff53f842b60204b35959be69
SHA1008b23e17a4c0c6cbbe2848c36f1f7943bf9f664
SHA256820d185d0ddbaae8163e42a94e025ab283e453e1bce6f2b47fddc18b5bd7aab1
SHA51285eddaaef7815a8c2cc05591558434cac1ae00647dd785e98755eb311fc4f1730a859356227e6f150f842f11acfb7ff96575e9a16e3f714809e75e5ed2634370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a95fee792ef00f7dd09f6c35fd2bda36
SHA15354c9f1a61076726946d1740c2f6d6194c6a5f3
SHA256f57ef815a550444de9a6bd50f20040271006fbc7fde48a43eefac9caec9f8f68
SHA5123f25a85e20d784e33f6d365754b351a8ba497c51e95c76176e34201e12442722046b7e9f416750b7329a5dab3b03aacf385280b5875d0f7dbc58a1bc01ae198e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567df0a3f11520c190c9b3f3f58ecaea1
SHA1c2800ad9f57b48f79956287fb5fe43f21784d3cc
SHA256b985aee17f63a93fec5ee828cf7d272446951b020bdfbee2b15d5f9c4be266d7
SHA5126e57a655884aa9aa1cf579f7b7bf9fabe4469a279c78d4a2a591cb83cd59679f5615d4e42711020c2f818bc377a42cc3f2828170924a70baed2f194dbd0896fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f38db4ce64f1d6fee51953a16a0765d
SHA1d1953eb4f47d2e6715a9ac6fafcf222ef617fbec
SHA2560e7e11523894e87b10ea21d606445850e374f87a199f374992e958679d8d91d2
SHA512eba3cbef5c59e2b39038ab6d7e41983697dfd4ef5491f10d5c67aab33824ad78dd23368a3f84852b1cc50ca08a4598a7780fed7344723cef64c8c443d4997f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be2880e96c88304de6ddfb8fe549f99c
SHA1fd4a7fb2920f9018208f0b1b51b1e83c7e6c9a89
SHA256fd0111361f21f807fcfedc980c75db2fe55a332a69c82c1dd82092ece92d11bd
SHA512eedf3eaceaf13521a0c5eeecb87ad1a1726d3b18b69cf27c0cd487b5441005617f617ba16f1ff5eded34f45857e156fa4ce5d780cc64c61b76b5d5482a4964c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e2ea83689d491b6af72311907cfa1d0
SHA1ce6157179270f2b66e41cc2203df2e5b37ad2de4
SHA2565ec5e35237a0506a25b115a4c1f6844fd9e9ba16f339dead84186b97d2803afe
SHA5124a567b03690bc1ad8be30e8100b714e06bb6f8c862341e149b86e52fcccaad011373188c06bc949777ecb8c5103c389364134b4b1b452e112d2eb3bf046c3544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e4d096888db89290a3f1408ef558e27
SHA129a3f6e1f4d00a6752f22ad2191a59dd5f585b01
SHA256247c732167ce9d0c9c5c19537778eea5af910cf86305ec0076c298d0595c7087
SHA51204896ca7fbb28a8e5bfbe776f0810ecf0c8993368dce32a506e5d19c94aefeedc9070f8ff2a11a984c0e4d1c42047be0a91dc4fc011da065421dfc0331cd1c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2fda588b760b80cf4771aa6837aeff8
SHA137f14a6aee71e2c638d78915d1552b3a3de260f7
SHA256c5498190ab2d4d7ae6586b95da336e5c625d62a653abbc6def19b04ef3eed09a
SHA512dbc59d3809a96aec89047efe4932ca5d0377e1dba9d5fd17f854d7eb5599d44c5062b81bbc2f7abfe1637eca17c94ef801565826dd3d22c83cfd2a37886cfde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac31efc2e59cfa80ab560d9c6c5752ab
SHA1b16abb43ac7b2ab3d86cc6d4aba89ee3cdc2032c
SHA256a8441e94c1b665e5a4f4abf2192555048b1c0a552e9cf76ba9b5bc21329a3648
SHA512f8f9adab94357dad4f23b2e717382172efcd8a6cae86df7d84715dad3c512ce3003cb2f8001953eb952cdf78a5c2f71b90f32fb4b136bd7f11f8900fe3c6a172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f85988946b4db7f7e7c1c0dc6575d887
SHA147a09444fdeed1fb09dc6554d76025699aa3d400
SHA2565a325f11b6f14f7349d8c9ae18cd0c5c12887bee6d6b102c3f1de0aaa2470dce
SHA512545101082bd2df1b2a05fca84e2a1ec7941b25f8dd34d4b1a0147762f4a0732011cff8b8075bcd5da4ca28801e8b4246fa4c5e19b58721227de534a046d8306b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a