Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
35ee0496b45348f84fccba9e990eee63_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
35ee0496b45348f84fccba9e990eee63_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
35ee0496b45348f84fccba9e990eee63_JaffaCakes118.html
-
Size
2KB
-
MD5
35ee0496b45348f84fccba9e990eee63
-
SHA1
71e9588f2c23de018b5fd10672bb7d91f16a459c
-
SHA256
fe685c0eb12b6b91307d734e6befe4f7131e026d2f80a3ad9c3a25e43f1820b7
-
SHA512
2748d53486b86fc3552f56bf09a2005528d8fb18447817ee3854f4a3b7df3d0db141779a13b29111611c3c802d6441c58b898964fe8c0f2067eb6a79218fffe9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7603E9B1-0FC3-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421613632" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000063601a01d157db619f255f53db90378ca644b98c37b151b3045c06a4fe2c2b6b000000000e8000000002000020000000316ff89a96730751b98e2fe281ff25960bbad299fb0375f1ab295cab08c89992200000001ba9673a0a0f83adde60f4fb2448ebdba6671b59063093a66902e2cf66a9804b400000004a321230541e8d93cc4214aa42e667b47e273e162472d1de9638003329dd62370fa64f6664a5de2acd8fa939a20da21436a30c6a1e6afcda81701a38d77d1bb9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201b7f4ad0a3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1704 2224 iexplore.exe 28 PID 2224 wrote to memory of 1704 2224 iexplore.exe 28 PID 2224 wrote to memory of 1704 2224 iexplore.exe 28 PID 2224 wrote to memory of 1704 2224 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\35ee0496b45348f84fccba9e990eee63_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a083d5dcc9f4e0af7f5db3555888714e
SHA1f367f54e9e374b2bfe600a96e097bff7c284dca7
SHA256367dffc313a15620d154820add66d5354b65b65e09079fb1eb7b549e28b5ab77
SHA512318c9abb9b5075285944538ce6f066cac4dd8d910aa904195d243c5435fc6e1d5923a63e01df82ca1347af801ed056c6f8bf48c87af0fa071651fef7ac21010b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cbfb89d79fb2f0197534b7ca3eaf1cd
SHA120e38152cfe4329ef7e411fba617be9173d12f90
SHA25689f65f97371b53fd0e54e596f11c7d66ad234978709cb32c54021fc6d4b3c369
SHA5125d8e2da74c7f550d5ecdbbdfaa7e02f1ce2d7fc8b4c66b28df4f97bc84d4e88738a8659aad40ac6a5115af155724a524e0cab827822d39553e284ceb65cec1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5579782bd51f003fb7f8b453c1d5a79a7
SHA15312c2a105be56d2345d11f669d5337582360790
SHA25648eab2529fedc58d6b2d4a4c208f1f0c6fe0c406482a4af4e56bfd77248e2dbf
SHA512c1f2a988598ddc9f69c2bdd555abe24714f3a742a967e83a193fa99e728658b179b1151b1d1c035ad2b13775181e87d10cf7a48754753974662bd10035b37694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5602fefb5bb973d202ac512487f3477dd
SHA1edf53de01ce56234322bafdcf9ce1f516a08b60b
SHA256250ccec73d940236b53ec35c97e54677b3a0f3a6d189c2f917bb217f99844e2c
SHA51248d9ec982223ab25c351684fe8cd9a9a94ad9e686c260b1f58c109b432c51c10d516fbb1773f1c5627286e730c8e48172ab3768776a7b187d9d7d2e6ec3ac7af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7685b4d740c48c4dce34e58cb920eec
SHA1087edb1448b687dade69174d7ab12d3a409f4ac7
SHA2560de90c66f55b7aadd06e498f05bb6470add8046a69563ec5a3cd12a144c53a2d
SHA512df60c4b8e0131fb43534e96304a1ded3b21917e88e88164c6c54170005c9be5fd8b3340c950d48afc17ef813f0f6e0345726ef6b32876ce6ba95455ad1db3ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbdb6b9a6ac11f80c98441fee57f00ab
SHA1f9701ce9267dfba3ca0486c2580d55b278379163
SHA25603de6684474150fc27b278dc53c059e23283e3a00497ea7275c21b55885fef3e
SHA5124acb65dd5f82ab617879f293cfac3c471c1e6997163106eca32a91d2c32f4921e70b12fd2fb95b7b279cd48dbce21c6ac1b981201d86aa3ed8621448d63c4933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535a80557f4f6a0be897b6f30b351e3d8
SHA1258fcc246a8c19db4f0f44f3c5401828904637f3
SHA256ca4f73d123aad171711a181e7eeea27abd25aa8ceeb573874b5a23dc01b1674b
SHA5122d50c3bea34917d3adc812fa2880d7e11edfea6eae575e515c3c7c75ade1cff304860661f6e9eb4f1efbf363c98ddf91e3bac18e11fcd8e4237505b923e443c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff6e944eb11a4771e5fd41e8f4103a62
SHA1f9b887163849277ec90c32bc7601a3e4372868f7
SHA256b8f359cdad05adc81ad94f86ab0cd31d3087e08334e7bd2225f8a2c2ae0bc624
SHA5128f3aee7709642ff2c8d64c56a7987fb3db740da42bd1e0963f9168ee83d17e6f86b1df50949da12d35cb2bfa932ccc40d3fdcdcc150c4c2003247d9bd783018f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508907a399d2be40929e68de4d8aeecc2
SHA151f67f299850e73247bc97bb4004a05ba3018da2
SHA256a7da2557d8fdd1851b8753228e17d66c2ebfbc6cdaeb56294b966f55169374b4
SHA51277f16bf52260d4b29c248a33d4ca1b3c0bff89f5ca9bf8cd4be7075d8626d3bc228cb0697533f4300b0942b9f9af3bcab29a9ec03bc87b6199be854caedbb4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f587c862817b988bc061c9211aab508
SHA1f45a41bc7320817effdc8a17fe92dbd31bf8868c
SHA256cc84536fed75e0f4bbca1b2cc37e3524a6bbcb1e5a1dc64db72f5fe02090d008
SHA512c6cd8197049ba74cb734fbe42b6deb58ff96cc25ee0d603389b8ed563c88f431444748b2f58076b93005b2578bb4ea9a41f5a3c4c751d93c10cd0e356933967b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ee649fd61e57913766e3c80295b30b5
SHA13bd43ff6e77fde5b5072be536ee379e06faa4cbc
SHA2563e0a8f856cf27f057f520bbf43559e4502200c1bde7c99914f76d33099c0a01d
SHA51241406b0a54ced08d42f7699977a14a6d329bab8a41a5d65ae6917c9b9d4ed5f63b845ec4518df250b53a5184d72ed7499f031bd9dfdc95b23fec7b8c1cf545c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583ec6811efff2f55ba8eb8342a0ca8b8
SHA11d6e29e57d48f64311daa0aa1db8b4a4d10c53a4
SHA256221213f90a25503d92439b65c024d0e64d6b0c9fe94c8d5141e138e13d8d739a
SHA512f48275d2ee5ee5c12aaa19e1898539c892bafe0146014652d438ce7d0b36bd979df6a001532db6859903832f515ca7cbcd5e1a696f6fd4ce7c34f5bcb32f861a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab3ce7acba5f12809ae7a8020b892e07
SHA1bdbd2b27b71fcc1f541523e479946da0d3f9f58d
SHA256f192a7286bc0ae619c7d51ab8a0f054a2b038b410a2e85e9df0ee965aa1f80b0
SHA51298d79d884344f09a493f1d54ce0c1ff0b78960ddf24b0b57dd299d5914447d5fc44d606c62cf97fdf0cb5a3d7de5c5a9807f86930bce8c1c9b0cc86bfd2d1fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcca06e7d3e4d6af8fc1d13ddfe701c4
SHA17566ad9226944b117912b49e4e1f969d9889e1c6
SHA2564447eccf6de7e5fe4f86adb509d10b458a5b1da53bf49ad28823a369757e8c69
SHA512171c19d18df529cee5204994713abb2ad5daca9ac9276e29cab49809d0ca4dd76393ca1cb29637e41289b7dcf077500ea78aabd2fbd2c13156d1b78ff50c044a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2dd65af17fe01c21614b832ba24859b
SHA107ec4bcdd12ff37fac8689d7eed1808607a99d92
SHA2565675807e2f4b5d1d69b70373d6dbd1b711fff265640f8cec755da0241245c8bc
SHA5129c42b17d0de1c7a1e8deb5cbf3b8956319deaaf56702948c537b8d6be930e767e4b5e109395c66d142819dfbfea599e361f3998fcb1ffb7456f4264e56eff066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548ca6558937d3db5c277eba3855f1802
SHA14f739dd10e06840e75432aacd4abba7f89257be6
SHA2569a2b6f117982c62138664af71ff1b91f587a47d77dd3ea099fe43ed1a55d81a4
SHA51228684f9b0c420f296b612583dd483edac06e1b0a20ab7a23c7f9adb3cd3c7cfc34b0789949491ee30a6b94670bdbe6a601adc146e41f6619967452cbd2b6cb39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cee884cc19f5b70afdeb48c5a009b7b
SHA1c36647f6ac1c2e69ecbac29e2792cccf7135c933
SHA2560144709af319dc59ad2d733b83cdbccf122a6057ffbff543b6b5625f7c636f58
SHA51207f2cb33de0d86d866d4ab5501e716412b341bad600b1f7102be611098966cc5e33ca7d664c34abdabf87122f3de2311c27b276eca74586601d0a549bd42f91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589aea3eb4acc5b9692c143a4aa131c3b
SHA10677e8958a6043f3824428764f858272f89e4608
SHA2561af5d1d964333123c9ea22cbf40e326c2afc9327427445572ea4405b350a2696
SHA5129fe116f0456e9555846165ee481ada4e3334ab4bdc7e657943168b38f9e2499ebe9d83ff7df57009f29aa3cda106e06ffc51169e7e0df276935c51fb271a41d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e8b48e75a8c492a53f31eff67125880
SHA12505be2905bb7b3c72949a077fad694935e0b0c1
SHA25608f3acab3eb2f62fadd7ae29887072010de9bbdccfbca63df347e7130cc6d9d8
SHA512fd7da04d49cafd3241506d3cd3b5e449d13fcf6ae2063c4a588a9476dacf8fc571cdca1ae43110f0b8c3a735a4e6989cbd584fb33d0a0695f3c736f6e7d6a5fb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a