Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 17:47
Static task
static1
Behavioral task
behavioral1
Sample
35cccc3f788f3c94f7e156c165ab12c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
35cccc3f788f3c94f7e156c165ab12c0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
35cccc3f788f3c94f7e156c165ab12c0_JaffaCakes118.html
-
Size
13KB
-
MD5
35cccc3f788f3c94f7e156c165ab12c0
-
SHA1
fca2c0ed3c540afc034695376581e1ba1ead0724
-
SHA256
01cadd9830acefc87458ba446ef5a201947b5d1afbc79fb9d414be25d559cfb3
-
SHA512
434b9bbb154147fae4049163bd01b926c941098b2391123f61d3b2f4ff67e88e27f2b2a1ca9b93b9be914f57764e37b659ff2d49acb40ec4ad7dd6fa1f33cc08
-
SSDEEP
192:SIL0ISz7PGAABEjDIBy5olsh1yPuYs9eIx1n/MzIqde3RIy18l0cXzFzyPu+awx+:SIwrnuEj6GsweTzIIE2y8l9kn/nXab
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421611508" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a6b89c4d0215513726b4ed7e0284f538abcc70b201ad1581b76c7296475e9427000000000e80000000020000200000007f39a5c718702217cb69d3c7b153da0f6f9f51764445837e63930e086ea38f52200000009048f2517a401a56303a531394431933694d0529e9dde06919252098efa86a4e4000000090d64577caf55559ec1f4d72f11b13b967bb1d4b46a2ce51ad5347f93b449f97fcf65837854bdfd66ef33ea799ced5d236172ffbb8edcf16340ae4565bd684c3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a4575bcba3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83F18871-0FBE-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1960 1948 iexplore.exe 28 PID 1948 wrote to memory of 1960 1948 iexplore.exe 28 PID 1948 wrote to memory of 1960 1948 iexplore.exe 28 PID 1948 wrote to memory of 1960 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\35cccc3f788f3c94f7e156c165ab12c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a8358bd111f7bf403c71e3dac7bd4f4
SHA1fb641568fae544bbcfb31d0660ddb22497468164
SHA256ab17f314c49b5b8a888c46e8c51069ed37725be551b819b51950bcd0feea8988
SHA512ea8fb987bfbd29a1af794bccae84a80b8875233a0c31c8dc04b011fad985f3441f9250ddc1c45fdf4d539207f5601437190fa27ab502f1ddf74af6b039e53d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e61fc1f9ebf98691488e71ab69155f1
SHA186b75886ff0745c27ffab7ec00af7cfe69766d34
SHA2564b19894c2595e85771b2e0fa8416e9eafdb1fbcbca2cfd5dde375b9c91323a88
SHA512a2ef78ea5c7eb81f0cadb8cb59f2253dea70c230cd67ba5b47f9be6dbc537f9834d3cd494b35e07627f51e758b7c97c1fdbfcc0175599dfcdaebb5c1af526209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffafbb7dce5fde9f83cf6caf14a99fc8
SHA1f77d3e7b90de5216209907822c8ccf1d440e15e7
SHA25601294e55445c611d10201c96fd32fcfb374f3c4c99f8139257bd48aaecaf78f7
SHA5129cda4afe29dec0393e0282fc398fa21da655fc9cebe2db458a47bd1c4cbf90216d3ef3e7d7c260a046149a1f3d04fed6a9640d5f4c5344af3a5f8d7b4ed6deb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8815ce0c061a03313ed8d63f48325ca
SHA10cf0e5da02ac4891faa28ae8c57ee238f26b57f9
SHA2569a8ba75d40e49731cf78a6d178253c99d0d5b65e70951d3604b5e8fd074dc365
SHA5122735b15757db7efaa80c3d18a0ff7018ffad50190306b815316fbb8693c2e5f71eb043e1ba0b104aafe9008ccf9d7deeb6e468be0ad3144040989621975453f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e96aa45afd787dd8fe5effec3813d55
SHA164c62b981649fb685903880781940c17cca4b063
SHA25631d4a3fbb2dd802e777f11b5b28d18b0bfb3fa16e05e2053cd1642689a834ba3
SHA5124984eb32df74a6809a047a0a3bc7db3f70ebbb974bc8da9dc91ea3bed30ec20569d6ced0ed2e9f32e1a6993b63e42d0f6ad34ba8f1c71f4d03e991c04c23dd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e27b96b455bff0741d331cf033c7563
SHA1493c878e05c774b3ce1eafe77c9a4608124cc79a
SHA256c198a2cc1f1e581e90fd95a16c0fbf5ade08cf9dc57ef3f90ab773b5dae897e1
SHA512145b650f8e24a32749458e39390e7b961922fb275006e439d840d0411615587e128389f81345494634d968542d2b31193adddcf42116bcb95e74d7815d2fa614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5074206d630c0c86e7323dec1fd39afda
SHA119c483e0fd5aae5579495244fc699d57bf5a5469
SHA25685e9d116032c7df90e2eab6d28c6ae111fb8a29f599933e7793d56886992b008
SHA512347b699537fd5724abe02dff3eac55ddb6b9b37d4f88c9a16b5c40d6949f186c1024d81755a5d0c8bf58970c3f4ebfb45a00abf0bd23b2725c0f1cacc5270dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd0e5d379e99a1d0a791b5547afd049f
SHA14dd8c29f5fc358f49476eb8ef16d646ff7e5ad90
SHA256d911771cac57e842a9a66c646c50e89db33ec858e729bf7449a733d6b65c775c
SHA512e515f501c0a1843a511d67dd0c972050093f38dab13d69f0ef3fd8ac5c9a1c91a30011b090c8712837454a1924bcdf22b511905e5248d78edf251c80fb39a382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a7ddc0ddc884d2be03b20af7a331ac
SHA1001851b277c3642fcedec7bfb65f87c79d1a89cb
SHA256c121446a1d8d6f74415f17eac49a706b85a5061a6b79f843f11c388fa3c7ceeb
SHA512dd67b3a367300fdf09450b54abc8a8bcc0f79510e93308c9ad22e2a35df20c7983bcbe0d97107cfa1ff65b0f0385f738c9c4babeaf35c436fd2cbcea9b7e607c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5629896f57d11cb61a5f226c2c14105e1
SHA1f53cec3b7ecd622b46c65604dea6a6517c5a90e8
SHA2566776d6c75cc9745fbd88aee50f124e57e3e619c36e7b130f346aeb626e1a078a
SHA5125c988a7911d2249beeb03c7bafec961ebe6367b6d4211ab874a79a414fd7878b0970abbeb4476f6793bfd8e3fef11f916497f02ac76d5afbe6d91713593f7082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8bdba04a08b182da566c7dd43629f27
SHA13ef71b33e8f17e16ec2afdc7524d69a4c9fc9db0
SHA2569b62677036baf4d641cef5601192939871152c7168c36c760120c7e7c6ff1d59
SHA5123ccfdad34c0b560bef22e940f338dca5507260081911c4d54770fdf280bca33d0e1f09b9338bd3fbd9478b5669c9185665e5854ac05c2748fd0a29c7dad745c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52485b1d826da280135078038941d07ff
SHA1d07cb880e560df8d97db1f1c7f647789b122f5ec
SHA256d3560ad35abf8c9368a97f580643520c33c5b170e9a00f5021d2180420a05438
SHA51216ac6ea84a2b54908722c54ba881af0c6bfe93d7774b9dde843f55bdc3cd22b7a7bff5fbacf08520eedc49bb68f6f72a232cd183a5a8a73606d901a625e4189c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543247464b29d20fe3d9a1d85c3407ef2
SHA1f2aeb0c42a1b354f961d2be28e67eaf35d9a8aea
SHA256c83186f32dfba78bae347b6c96959e137b8b3b355856ca73869f5f3c3d2425a5
SHA5128beaf231631dcb7e04245af1af0698242dba9cf77f4daf9a06f770b4558dc1f118e878a969328d9dfa3ae2d6a5c945065204336b34128125a360ae2c4b14cd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ee4e27bebe3bc84ee860c2d85566dd7
SHA1c335cc6eb2338b7b6de467e345cfe3cf7f5a4fb9
SHA256e65f0f55e8c7937af4b6e11ba426336e17b248967c186439eb3540621a0d5d25
SHA512a71048b48b6ba4c04ac21a9d6ea22772c2ed07691a40336428d99e3557d19e9e6dd863425ab4c2e72605e24e479f0b801d410b7de8f5a40658c0b4812a0818f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed4b87f6cfd6906015d089ff282c4403
SHA1606875340438bd41ed36bfc8444a60d7940f64e0
SHA2568f479b9da8158dbe04f60be1082579c1ee1098faa0eaa8d3854d63c69e1975a0
SHA5129064aa88701acac4f5ab7ec308146e93f55519c8c71bcdff279263b5a9631f6e68ed4358b453702284272c4864b908d0d9b7f373bf2c5dee41ce91e1e389ba55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c16eb56f72723db4412ed26badca03f
SHA1c9932c1cc54e1ae681f58f3dbb345244381a0b3f
SHA2569109c3f433da79386f4804f0f27e03f2f2a5d3fc4f87bcb3d5a70e2c17258fcc
SHA51280149e6554307621b6fb48adcf8654ee2af9e74fda01c77b9d38e3c7e1ca8fd50e4d2918f508a4c518ebef60fe306480aa5114c3ed1ac030e592b51beb7cbaf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eea344c8e84b51d02679360c3e55865
SHA10554e393930b5f6fd49c7ad210cb5aad80ad2ef6
SHA2566c1dbd6e61562becd0ff729cda6d299e312e24aebc085177b1e3793e532e3157
SHA512b1d50a3314b427a3396e8daeba134e1fe39c4d1a49465aa528ce89817124c98dab9f6cf8d8cb32509eb6f11c450d892d1e37567e8a8db39819f0eddce4051cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521ae0c467a3ba086ec118bdce77f80f0
SHA112b9df7d891b75a44c17f29b651931b3cd38afe9
SHA256c553dee2c952c33a082737af32ed66da8a12f16531571cab6beb0bc0a1bc4e28
SHA5126026f68f0af489a4f58c60bc8a20f90b5f161ed3e201be2536d9f83efd65c8bf4eeea0fcd22d5a9d92f6f1acb0aaa658ed49355b761e340cb4ee0b46cc5ccbe1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a