Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
35b098e0317a40922779f64d62fd2bb4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
35b098e0317a40922779f64d62fd2bb4_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
35b098e0317a40922779f64d62fd2bb4_JaffaCakes118.html
-
Size
67KB
-
MD5
35b098e0317a40922779f64d62fd2bb4
-
SHA1
8b6e3279496d016fb0bd2da68820a968b3e68577
-
SHA256
e8553ff43ab87ee20e06524d99f65a750db7103931af6ad0ec4f7474777a9619
-
SHA512
986c3706ab1f26c27db281c313728bdf454dd3d1e2d4314050106eb85622cca09209264d056a22c69a3a6040fb2396648707aaa5d05324f33327275a66da6326
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6sh6APoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JdiTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421609781" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000003dababa311ae8a6d7c5518551828dda36b7be243f31a377476862e9c2afe8d40000000000e80000000020000200000005c65c5ff508b77442336c85e74c405952d1c27b0c8ab94a3e5b757415c9e2342200000009a6706eba0ab9a5229e16c6a73c79bdf8e135ae901779bfaf4e7ae42670b301f40000000053a3fa434f3dd0bd64e767fb28d7a9fe9d4720865dfc0454bb1ba72224e34d00b6436ccd2e70ba48bbb6505ed88db68afed12f1291661724e8d98a35385cc3d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E901C11-0FBA-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00c0f55c7a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2532 3064 iexplore.exe 28 PID 3064 wrote to memory of 2532 3064 iexplore.exe 28 PID 3064 wrote to memory of 2532 3064 iexplore.exe 28 PID 3064 wrote to memory of 2532 3064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\35b098e0317a40922779f64d62fd2bb4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547d332e0f499e66f3bf1e4519394845a
SHA18eb553d781040b01ee50f1a747c1360b9168e99e
SHA25680fe47bf88e90065c09ef1055c4f082b90e3dafef7d752175782942c679ae93b
SHA512d5b29b3cab4be3d1c200aec8bf9db32a35dd83b269dd13da5dfedd885cab3c5877682e0f1c95cb4768656afb591df2a4217ee2d6ac439a74a02b80db5c45c7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52214b7fd2153a8f44452d40b2e04e856
SHA1534d94d27acb0e7ecd9dd0428a89f29df0e3e54a
SHA256fd42bc48ed26b303d642a5c17464b6b24a772cd5f04b7a009456354361a5f783
SHA51250a929f1e41e43fd76ed620af9f0d00bc7af5f144c4fed0c3efaa34499a68c02a6e9688ffbd8a6bbd1cdc874db03c2be78eed8bd0589fc9b6baaca41ca92a9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce0553a14e6a3f3e706c264dc137ac11
SHA1f6c89851d404638613ee9ef6cc33bd55cf656275
SHA25627707bf4ca5bf46c3a2c8d3be7d8ae3dc80df6520d5a3a9a2f9015973bbb26f0
SHA512f71d5b5e8d07a384818a3a550ec4cf01de714a52b4c34fb8f6b65c8185a4081cc126bb5458b52fc99ab5d7222b38bbcd6693a8c6ead48acdacd63c556ad4098e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580e64a94f444be346ce1993330043768
SHA1e923a32998b50fddcfad6d71687ec444155bdc6d
SHA256aea5cf639d89e1042485600a5b93cfdbd9670ad922fea76c73c7d626ba5b2e50
SHA512fbc7802115c8520b2725d6c4758a1c1293af9757bfa7b7a64c8d07a9a743894b16c2971ee986d0cd60dd96d93d2d2b6ee30a84a5d5c03254e7b61c5dc9f86dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a9c493dd4b9eb6efc629930257d2f0
SHA128af3c49e28bbb00a73875a7c11c661e8a3cbb05
SHA256034ecb2122d5bd7e89148c30dc94972c4cb3f073510c4d304fde1ffebe5af5eb
SHA512fe54a0daf0f83d8b057d763253b949efe78740c75be947efff6ab80e2bd94cfbb66341e8ab4341092781c2b3be077df9b520df2cf098d4c6419ce3100e19c3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5165ec3bf3cb1c4afa7041136cacc0831
SHA10078b24df11b3bbc55beeca588a133c8481ac162
SHA2569942d32cfcc28bfef022f5b23f772319ff25de7bda537a19c35b8673424b1a2f
SHA512673a020e909a4400c9827b087d07a88fb9320edba5c1c506d848a36939c8481f17e537cf7dbcd69d23a9feec437e95cf1a16abd01b8af57e99fbb994f4d2dea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519b93fa4bc4a4ab6edbfc6228b55ac38
SHA18e611bfffa64e8511aeba1f05bf5daf9d9d2b6ae
SHA256fee16d1a95a73c75dfd5c0573c9ec6793e0c95a77f83bbdb813a582c045e55e2
SHA512f2a0d31104f1d55b00960925c62c41c7638cbc0cd9247b0092c26d6c103b98b787b8534023ae2807f855d5c2743997224a24f98128616172bd5d2531f80d1398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb030b91b92bc948379dea73aad4aef6
SHA1e13efbceeed0a3cd189e65e11cac419388c155ef
SHA2567ff3ebe40bf40040bea43db8c969e4d205c8b8e64e7e8ad4ed06e76446b00e18
SHA512ac5c5e3a05153a1d1d8aa8e409abd8e12751cedf6941b2e9c4fd70a189557ef31598573f4a80ae4615f74fafa9b9078c9c5a67cb15a8266974856dd44c181ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5538db95234f377a6bcd686ac0a108458
SHA130b5c25607e9a371c5c8b1edebc9f4e0931a506b
SHA256bd090a016cf42b03d0cb72c827e0adbebe1a8544001826db0467f4e77df505fb
SHA5121796a7df460768f3fa23cb9ea10b67e2b86388f536150f4f865688a555978245440be9b5fc46f9f5a6bfb2ca4753c734eff41c401cb217cdf6bbc0a7ea53aeda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fcc674b226d3e6977372c2cf079e6ac
SHA134be1825b0e744035ef69f23769b17bc906439d6
SHA256b739510cbf83f1205f89454ca7abb2c5eee30fabf6efb32d6ab14aaeca1f2e33
SHA512dd258b5ac0e262e461e20d3d119a98882e455b312852b84db1414462eabfb64927cb28ef7f5ac0ca4f254f45be669335138cfc5d5563bf2fa599512cda05440d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0ba83087dcbbb3e479ef72300a09887
SHA1cd11dd461240ac0c6fb720997b3e1f42f7a39fce
SHA256bfed52d9636620778fa9c1729c79d83cb8ff021204ae2e4b71cd8d5f344284fb
SHA5120b50c3ce61d2d2311a1934b3ec1b1f1fbc40f71b36fbf2e63c38d8dbf99d6b93b54b2ad213ee2916be8c8fe0b91e5d56d4f1a3bb122e43db47fa423af2c78ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5d9d83a907f6d2fce5ad3b0bcb8baf0
SHA13d2e11b841f9e0b3b38ec77e42b9c61049b580f9
SHA256b93afc5e3e0a3b8ace5c51a5f0ef0c358766e2150ec3bf417d69e8bd96a027e7
SHA512958d8c0c6b550891840c8e4dc04b102b697a69a1ebb305105ae2d7dbe19ea859ef8d8231adb1c10173b1a7e0dce905f2b99aa72a09da09b5fdd9f24d61d91765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0a4c813fa941df64ac4f386492c355c
SHA1de737ee8160426cbe7ddb3f29aab0eddc610fcab
SHA2565691e51f28dfa923c48954128a597e7ddf602347ef72d04deebacdccadee10ae
SHA51201e02fe8e3519de650c411cb5d8e57d3d1dbdd1fb80b4bfbb263aef8cb6863759ab5a8ce2c90d032aff1d023a6af780d35db47928695e2d0d4d4bd76a6954510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f73505ffac2bbdf090c2a3bf8985fa0
SHA1d2e79bf3b5ace45a456c626c8a668957d7231fd1
SHA256e9ddd521c52a7a8acb3a25f8291c561731c0dcc526ff4bb994d48b48cba0b987
SHA512c1cd9b32dee15b01506a3f5acfeb8967b663e125472d79a46fcd8d8bfc66ee369fcb9c72dd9d7a7d9318b015f8110cc78de2375801cb0643c0731bd9403be0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528c93760bcf790c905aacfa95f6abdbd
SHA1591bdb42d3e90d6148a8c960388feba6fcf552d1
SHA25626a1799139feadec674ea07ff6b85a31d8f8432593829975acdeee89af0c236b
SHA512841b78db8639b564dac6f3e18875d1b71c1b1a17921ef693e919a7bcab2bfcc2b55bbab67f1fa6cc4334bd834652e8f8176d922422e8eb820b0b6e0258079d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956d4a24a4b8b9d160b6f848f0dffe20
SHA114ed2eb2a02b52a0db0ef25798c6746664f837d1
SHA256ef693299ffd68fbfb890213978fa7361af678d6f8da6532d44d6abc39778cae1
SHA5123a8e863afdc8f7e6e5773f5fc7bdca3fead64b734d29499de8a3e9b653c0f395e67e1667cfe838d45d5cd1b98fbce3b875e23b687b2c09ea0abaee7fd9047129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595fd21e66d94fd8c1756da076f490a5f
SHA177a2be55dea26c4ab0998b5e3631f772e15794e7
SHA256bbd965199e71d9081e143c4c9bd2e7746117a877744a30e9b8c3c13f25585c51
SHA512765af301cde8afb3b9cb7346b51899d22342728a68aa4048537636febe391d09cf55324c82672b16bd1d837a37a193166ba0d40ca10ba6692d7619b84aca8a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c8bba83e69069272c7d6e98fa5c4e93
SHA15ec619df7fcea96b307ed99e850a79b8f2f9bb56
SHA25674d81ae6265c9c38b9b7f0a80590d69d590054806fd84b901f8df5aafdebf279
SHA5127165dbcd0bf89907a9811a02e1f4b841ab6750a4cbec5cbd80320e308ff475ad2e31d0624d5c47acbc9bad9e074f9dc1923cb7cd57562754b1a34c28d9437638
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a