Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
360382bbe34f987f60ddfbe8193f5ecc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
360382bbe34f987f60ddfbe8193f5ecc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
360382bbe34f987f60ddfbe8193f5ecc_JaffaCakes118.html
-
Size
461KB
-
MD5
360382bbe34f987f60ddfbe8193f5ecc
-
SHA1
728d4d8bb7c91894b01b4257ac106ea88fad7b3c
-
SHA256
405128982d6b65fd774afd2153a97cfff4742ab9e0e4f660f0ea3e6fb0c7b927
-
SHA512
d4dbb30b6634c671fb1ed89c89d89722227b278fbb75b3a5a673faa1e61b1e2a86a7459933f56c4912e5f4630e32ff7e85fb29dcbf7f6782cf5f621fed940ac2
-
SSDEEP
6144:SnsMYod+X3oI+Y9YQssMYod+X3oI+Y0sMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X3K5d+X3c5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421614988" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E3A7091-0FC6-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b094d276d3a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000d051ed0e8814114e0254dcc3c9d3fd5f9d5372604e596513bfb8b9a13602b72c000000000e8000000002000020000000ac7e5f1ca9cdff3698d6543db3665e954e71d331c051f94904cc40b1ae3ae444200000003cabb1496831abf40edf25bd4bf5c6e16891005d9edd38a4180737160ce1190b40000000886f4b333ccbb2c0e07671df7a4d0e47a3c839e1f03bf126110f00f560b1234facf016ebfd2dee6b95e2359f4aa45484c653c800248503dc2b19a19f6d8b1b2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2164 2336 iexplore.exe 28 PID 2336 wrote to memory of 2164 2336 iexplore.exe 28 PID 2336 wrote to memory of 2164 2336 iexplore.exe 28 PID 2336 wrote to memory of 2164 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\360382bbe34f987f60ddfbe8193f5ecc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59401945cfcdccc6a51148454b47911e4
SHA1030a906c76fd3602cb632e42e1d5d76d92442dd5
SHA256fa6c90c36ac7e66e85f05deed1fee05d2639acf94d1ada3eb3d7d4cdeb31f5cc
SHA5123585d51889443eef00539506766f72af7c96c6c191f960e3f5c779a244454e53b07d7d6d14b2717919de5f79684243152e46ee165cce165d1955a56ee15872f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b37e2e5f87b0dd232e0480db89094a2e
SHA164a7f2b6ec8c83aade3b5ec357c515ec766b5664
SHA256428f16b5b01bd240c9667b752031b4f40d23c2c858bd09a2e5c7b7ad16f147ad
SHA512ff9fcfca0b52048ffc24f1a1b6d43a17e2ab556a901dc795e2600b5b43349acb8da471d06b35ed8665d12ebe85a1f0743acddba538da6ff868ac36bcadf5c270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592b6b4d6063f1a201c44d58c010da790
SHA1f111dbcae43e1600503d208982795f9971e58f1e
SHA2568356923e8fb1d6b8d74a7372d203ffb353d76bb5784f9b19cc787b8fe1c9a9bf
SHA5129f0b04b5da07f9185b742d86b1878d964e6d61ff550a40e7ed0d3a2b2744e3f14345b5330077746baaaca6e9853de12fab38bbf4ce0316ec0eaa8dc71199a8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb7d8090db88ca4e0f15b7c1cba9c903
SHA16b6415d6a67811eee41e99f052a25a5539055de8
SHA2566d4dde79a27614c20d1271d5ad1a179910826d7ba8ceca60e934fde084e8e393
SHA51226d8831db98c49e6c9ad9191f191d2dbf6ab7c094c7f9d161e7a02ba394a4f750f062f482cdfc27d3c262678939931c23194afc6b1f37a5f70f900a3d1a2d929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcd8ff30f019bd05940c7b72d5d6988f
SHA1d5fd0411ad2ada38ad4c1dee3cf78e61410b932e
SHA256ad746d5544e36112af3eba23ac45560097ef21d1758ff35a887a53accbab6a2a
SHA51266732e902072edb82564e04a3019ed6ff13cf6fd314d6ec3d49cd00e55761a94804f11267596b37c59d04a5978f1a2b7b50ae2f9ca27178d1a98b097c9b1ed0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598c60d2c3d4e42294b301445cf8926eb
SHA12799e071212b7a9e88e17284fded7b18018ee950
SHA256e598dfc58cc4f168c0129d72e2033df12ea39d1faa05023e32f3f0eabd0e86be
SHA512b23af343c5914aa5b128ce8f4700d2290afb8c99d4eca8cfcbd4b2f9124ca9314aa75b97fbf0650f048c0b56b98556db7906790d4b2ae5f43023b8b7dbcf2515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f84d40e5f289a2108603dc6fe1a21a7
SHA111a3c777e4902eaa4a3adbc87b0088e0b4b821da
SHA256dedf943b1a8425432f9e63899882781348b2a2606953cd4264457bd256152edf
SHA512dbc619afcff6334ae65222a8db96f7a05acee58af23a57143a148a4f51a3680341dcf31a2a32a43f1b4aa724fb2b3d14919f03de6a5bc40f58bdb2f0933c0051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597d5f190cd29718a3a99b390d4abf265
SHA17f0f053549f645da9a0e4df72062e6fd164ec042
SHA2567b6386e463176a21e2167e93ce88cfdd111636f479c88a9451e55e2d407e1eab
SHA512bbf7f9a9946f339939c31b430e29ae6155b9cad9c5ebb63a54ffecadfbe348a9640378b742f9bb8d4050db58d9c86d673de07995fa8d5eb4a0a8065429a44213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59333e7a5a0f685caea44a403211a1ea8
SHA1e3af01244a861fbd7e9f218587e5920e7023b3b6
SHA256a21c87ae33e9583ab32b2207fcdef6118b7c6a03bd0a65313659ac0477d5daa8
SHA512c845f0ae4771185e392ef2f49d822c93e09ab7c033f8b78ff8a56cf49a73d6feaa3827f28a7d17139178a00e3f0f25dadced6fe908a1471192cd46a2e7a6cada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532cbfdbc5084589c9b5289eed009e46f
SHA137ac3d041b5a3c85059a4fffdb4e2f986e469bc9
SHA256c9328f20b5900e3104ebdf1ca6a6dab2b4c0d6772f9423abf0b6b5396daa02d9
SHA512840820e30f265e1e5298fce637b69b92823029c9ab1b8e47635050f050c538bdcf19ac3b609cf5b0a709206af72b1a8991675814863286fbfa05cffab5f77785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0a31bad0d9f2e71502fb8441ce3d466
SHA1615a7859e8a05c847b5663f4874899f9858b0514
SHA256aafc65281ee68b74ed7e50c82273df29704b0c758ef6275aba8a75f2bb27cbd5
SHA5120b8723a08a60bf2cb3bb77623f6a6fb2decfee2fcf9ee77a3ab8ef71e921a926807ecb15b8cd08d1c32d3db113b5f7ca950e503abba18663750908810c1872cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584ab3c0670da8511f44a9fe9c2e17bbc
SHA129331a3a75f6979e7592ce0a03c3df336d7b8ad7
SHA25600976ecf5b80ab898c4d0c6a56fc80aac315f22a920663458f2f026769df572b
SHA5123e7f44d08da511e9f8760def2b4ad68ec5f9f59e0f0223dff1ac9d5e2360d34848b1c14471fbdac12797447968d2438bf5967b34b736374cc3cbc9969c8c3212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc7c2f281a18d1aef3f60635c621e495
SHA1a940544f8cf9afbd7430d91f7a57b8ce543905ea
SHA256ef4622f09d2706d3b13ab2cff467d14aaa7deb56d6dab2bec87c9cd073b97546
SHA5123524cf640ddbf1379f6c749c749fd982164544cdc53842e59d0c0ddef0abefbdb664c1805f21c570214e8be96dd9ba88969118e507735354bcb35f351cd42787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb2033ee388e96e54746e2b90c0d2de
SHA1b88d25006cdde0dee91194d1ed8ba5cc69961628
SHA256df197bb09357d547c01acf3951b43448ed8073d30775b9ae075cc22bb8930bf9
SHA5125183d14cda2a34394eadf3dda34b0ec4590eda7f93c067806195b8844515093cd62719d7e9bbdc977a665ff242e9f88df34a018480a079df11af23a31b4dbeb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57861acc457ebf6bc2e9746640dd76681
SHA162a9280db6ce8757746d4e7c2c8ca9caf74619f2
SHA2568f0319c1043b7723d2c2c0d7dcb4697edfaece66d9426651ed1a4db67f6abb50
SHA51240a5a37c1f506448b373952e4cf4f1311f84ddbabd3fe2bbcd25504b4b9417c9b9fd223928752ce17a489a267d2fef58f825f428dd76d7789c05e64cc15e0e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517c36d7f929f16742719d6f20eecf8d0
SHA176fdbde2a69791e6162e36547ed21868b7cc1029
SHA2562e3688a3d42fbc5e9467204cef21e19767ba975da8cfbbfe20e96cab8f21c031
SHA512b359b6a0c234fb486630957d4d401d68736f58bbffff76900aca08263b80d8e8e254a5b074e7ad96ac4c490d785e683ce3a22ddafbaca8aca55e4720d21d9de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cff9bceccaa3a76cab28c9a2336472a
SHA1b5a9ff75b2e70bdd8844da9b4bb6489884a88758
SHA256542c2572dc7a05346c1bae29bd3888f7c1de8bde0e502aea4a21eba981c4d712
SHA51207ef83cefec6e4e2d6ee77a5cf47ec16e822ee91512d61331dcbd71be481464745a7e53b01ed1ab9e7625efe43866d33c88c7e355b12ab2d7b1378e89b83e7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59acc24b5d5f272bdabace2948be6f543
SHA1992e737cf6eb6dfb96917c0855fbdc40c5847224
SHA2568993c91813041106fbcd3a37c030a2e75decc4f9ccee682d8c8de9a2fcabd09f
SHA5127323b8f7f769d3183ea4b55b0f9e623b1fe50735f0f155d83364af6cdbad75658652bbd8c18fb56139acfa46af9c25dc6f1595897a6ddce79c14a3bf61e03806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be80ae88268f2533e8435971db510d73
SHA1cb014eb4901a1b83e51eb47f736c5d7723947bc4
SHA2561517d0ba4e4cda9457c6b3b93cd501db85ce3b5f818ad7df74f7b1ced1e68972
SHA5127da8ff98de04a0ddd22b530073f7e36a0d811911e6d3d79c3832d4111fb62fd95a1b0c85ac719df04bd08441d7b449c157fc04304f4ef0574a3d84aef3e8aefd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a