Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
360e8699f67abf7185225475441892ee_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
360e8699f67abf7185225475441892ee_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
360e8699f67abf7185225475441892ee_JaffaCakes118.html
-
Size
68KB
-
MD5
360e8699f67abf7185225475441892ee
-
SHA1
2f3afa5c247b501b1233b2dcb8d6b67c00f58e79
-
SHA256
ca62389532d86354834b65a7fc10f91816e69bf1845105c64bc2e005d96652af
-
SHA512
75f0260d40df85ec874d74a5770d243d175db92b9ae9dbcbb5afdb91e852b43d62071dc79893f00cc39eb9b252599e46b5fd8b7736e3d42d25640a1a74ca6257
-
SSDEEP
768:Ji3gcMiR3sI2PDDnX0g6ygrU57hIoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JlaY57hFTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000009f4843ac405fa791a8877d5ba3f3c0396a32283080d8a4148733cd51dac668a000000000e80000000020000200000006a903504d9be41322e102f7c425da496b67b4e8738b94e1bdab5d8f59d15fa1f200000001ed6bcaba3469f2c286b145c21d199b6de9e0cc7af0c727e08f2f6652fe24a7b40000000b739d022437c52e871e064b0594cc86fca34504f8acbd53eea92b35b37275d6943dcc7385cd6e6679a25f1a27a5f839db8618eace96de50ca5fb71b1cff9114e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421615684" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D369D81-0FC8-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7051fa11d5a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2500 2920 iexplore.exe 28 PID 2920 wrote to memory of 2500 2920 iexplore.exe 28 PID 2920 wrote to memory of 2500 2920 iexplore.exe 28 PID 2920 wrote to memory of 2500 2920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\360e8699f67abf7185225475441892ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59de0bb00b40475111220a6572d2b6980
SHA1da19ef235cbc01897ca335fabb58f70078c0dc89
SHA256338386eb59637c82bf8d2696dbd4793f47edc1e37fcf3c24e219546aa49d23a2
SHA512cc89f058af42fadb4cf1b113c4edbacab8bb650a1a70b779739f9a9d1ed6196c89b9a4afe6b208ab00fa8d412cc3a5b71747b0355f5ebeb116380b2487fef27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c9f3c3090043397844777e8e88adfcb
SHA1e5a070b3c4adee944ef2e4a449deb57c7d23fd5b
SHA25659f12564ad5bbcd710b1b868597719942a86daec6938916ce79bc340b1072984
SHA512bf921c01e0f6773636c33829bc3c5f28c04cbb92a96a6b1847e97037cb7183d99df50fd589b63d9510e43515f8771aa0bb51adbc8f97ac8f125d898405033a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f649775ee4654541ad163fb926dca87c
SHA16d88f6e1045f31e492d6215c04f40d6077160581
SHA2560b538a5116ba2b8c544d24d7d168245e31d45fe29056f99721967491c7b7a3a9
SHA512424832f554aa010572d8640f0e87f5eccd5172d99108a54e8546f486321ec04f5562d302d22a7f53e82edb6d2299289dc4332e93216276d0e6dd93060d2180c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595b7e280a409da109610520350b4d9c1
SHA1db55f6d84931688f0462838d60f57f9defcadaea
SHA2565131005d4697a98178b27648d634f6e834c6bac75449f75d72c63728c72a48f5
SHA512336019fd6c07bba96c8e3b119f38f2d1760f0ccada843fc4fcbcbaa27fb9ca90b55f7f74df0f504b524f6075e98680d903126c0395862a689ff7a1e4a4d0d121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f87cfd7f552e02a9cb1d9b3543bc9265
SHA18b6b3f993a82390a4168cf5c45ddc3eebf6b9680
SHA256b44db405b87dfb6932e7ac0e34af04cd6ff7072fc10e994680f316026c5eb51b
SHA5129a29a51bd0d5cb813d3b719c682983d3501fa014dfa05eb4726309c79553ed3d1865f6a94239b38bff8f858b0ec2cfe79bcf5da1db5ed4a144a6f5aca0746472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555c714fb45b472c6abb20090c19b847
SHA1fd7289345a844f17ec12e93cf23fa1fd641ec31d
SHA256b464651e1c5adeccfe1aa7538a21a233201394b1980a4e7e1d0b09b57df1486a
SHA512a8f2b74b8486411f17582c29bbe33d581a4649de6b40b9be8d2175e900c15aba23b0e04509c8d9f4c31106b004cd21325ebecef36004468ef29eaa0af01bb4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4232d92e95375bd3a3975650809c99a
SHA1403836c0d48186fb0898c8974bd953c33e90357f
SHA256d207da7aa751717f16d1b170b9ab0341728552d7a4f64c96228b80e1bea9e2b1
SHA5122d60492c3cd824f14b345df81aa240da8ce58109b436b9f9b6089faa8858dfd0557eecc33aa730070f77b25e1eb9c11b7dd653735c510bd06b74b1b3fab67c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd299bd2103790905971a7e73030f89f
SHA16316c97d1ba5cb5f5e30579f84361bc69227ca22
SHA256b4d2b1fdb0e964b803b160af733f94bfd5cca599c66d413920c43788502f21c5
SHA512a9255528fe5e5fa70ffe2b95862a42a742af7c8c7681408057a5499d1fe05c2456206406bb66f32b98824a5a1c577320ca948062989c518b25737acff4bd1949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565be3d0964d8946c72234ccc637ed254
SHA11c0dd231bb20968112724e8ed18288d3b2c14987
SHA25654c7b65d1c81dbebd176955037532fed2d617a4cb4c913b61f3e935c42170004
SHA51226fd69151229be56b6a0c28437bbd02d8045f0e740905fde6819afe549c77a7affed5215226109337f2567b7bd429bad6688dbddab9551107e629139e33e93cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc9ec4a4a8ea6f57daa7f9fbb2f74806
SHA10d2162f4f6edf8069d68ad8b738504f06538d3b4
SHA256c5ab6ee4a476227343d88055d55484a658c95b7c0fbe1c13fa54cb1f478801fa
SHA512d88f5c85d6bd410e8672cb25268dea45cf23f28c99062a080be3c427b25efebed6a2be6ada9bb53046f439458f899dfdf6c8fe7fe20b6416743ff69448c5e218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5718cb8b3f145d101e911d966373b1c5d
SHA10c33887c1eca177004ebb283c67a45362a3db635
SHA2568ff3cf35f9c2942deb300c28dfc7a80a71bb2bd53700f781175b39f984895da6
SHA51251e260363e439c54b12892b0f55bc4e7ede695dc95019a1cc0788ae7a103ce47c0fd7fa61c83c29524ec49b8f74261d02650c5ac476a2c233cda9805d3e8d6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509a6dd11226c6dae89bb121b2b857e52
SHA179aa4e408f883016e0573d6daf37e0f46294b3dc
SHA2561eb1609c8e10dd669bc18e5013d07856cf80cb76be515c1ac86086b5479736f2
SHA51233da7dde51dccf8fee829b7b90a70c0787d236566badf021200f2450b9e62b2549c2f415d20fe475f7d98f9e43cf904503b354ba72d564f3e155b45b59702357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a0f589eb573d4b6dc1f8c76e4f0aafd
SHA1dcb32435ca68d477cede08cad4ed5a6a5c768e6d
SHA256c66739725975bbb45633a8877abf2d2805c555837ceb9b30bdbf10383ff86dc3
SHA51223b9df53c78ef5f18ee1a76178d954294f7eb6e661b9cc771979ffc4657b67db1e13e594f9119408926f7964f826ad5044529aa740336eb5ec004920d79696eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd08e02e55659137afb99c897f6270d7
SHA157ad6a849665ac1f0f3660aef4ad160cf8302179
SHA2564d7b50f9e35b95c2064db64466b02f912e69b4975b2cd8a5a3acca3f3259c467
SHA5125c1d9b017d4f92592f992a3ef7eca983ef354720690b6c7201000c18e12b5936668d04d4746dc0e10e0628623d90f5394153bf4b32fa4911970a16e58fa0c180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586862a3f5ca694f1ba2885c1d93281d8
SHA186a8d3e9240fa7903a6e49df174c0b8b461e76be
SHA25657702ba0294fc240ab75322e78b8ffe8f881fdc4ebc3ed691070939503bba44a
SHA5122d292d9db7df2f497b96187d1a3ccbab5c1cb256dc3ba58abcdfc3a8307545cbd47e747e8ee883cb7f8e05779751cc7ad31ec3a099d722c6f5e929afd69e2052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5689afaad5b4606e21c056ac78e54508e
SHA17b5809372248569a4039781afadd3f3a63566c72
SHA2565f3d1f663d3b791c3fe94277cdc3566f30a23f7abb527ad21d474120b9bf51b6
SHA512a4836d6cb89d2e337c83d51d4aa91b6ec7bc43fd73b04d80c91217d9e36d178ba778080d9356c7f032385ae88985801bd168cc4875f796cd88c8681d2fb8b14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53282e03467ec4a490db7e62afb0c77e8
SHA16b64b3efd8503651c9a9495f36003b9f14e0ce3a
SHA256e140869629dce229f29f63e07d2eb02f9ca2a8cf1d4ad6d4fbd171e7b0bbd972
SHA5129f471bbe2593a7a25cf65dcd8b948d5c313a5dd4d85ea5bf01bf8d847c0dcdef4a84e5097a6d59d0c2388bc5ebc98518a421b7b825e4735b7009498a5992becc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d56d835f26570da8d5788232e11fb091
SHA1e86c584e05952be62290c74e399ffa8485c989af
SHA2562729c40d7dd458726cd014144d8e4538e6bc788539d418ee9fa660145d807687
SHA512af18b20fabe7fbe57a47f0959dad82b173bcf5e8859e5853882d2b7f9931b78d41e4b59d1d1166ae4dc5095a42aec7b20b42fdaa5488163a539f6be6d706c9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5527a894da829b1621d5af12183af29a4
SHA15d92d458c8a70364fa1580953701dd89e7792f3d
SHA25670ec815b316a14f983728bee1a8617a4a3183e2cfe339d6b71033065f9da126c
SHA5124f8037774da9dcb761b35b63acd67456249d70a6de2e00e3d6102b8ad260ac41eff63e9f860fc70fabd7441ae048e899462a37cfc993e79afb713fe5e6558f8f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a