Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
3636c3627eff6c07ca15cfa08a661d81_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3636c3627eff6c07ca15cfa08a661d81_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3636c3627eff6c07ca15cfa08a661d81_JaffaCakes118.html
-
Size
2KB
-
MD5
3636c3627eff6c07ca15cfa08a661d81
-
SHA1
d52ae4142b8163fe7bea9fed5c42b425e6ca1823
-
SHA256
ffa42d13cfd70ebd9108c71f9414a1bdda13139f82e429ce1e94024fd7825fa4
-
SHA512
3fe62978b5f6fc6df822ceda3d64a793016bb8f497f0251f37cffcb4c8e093ec414c4fef8548baa882f7a151c2c61ce2b6f3b50478867e9a26d47b09950b4fe7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421618302" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000005ce91d0a0dbd9b8f9b8d42353ce39b6241f875dfbd603a21e10f23a8c2fe3c4000000000e8000000002000020000000eb03044778032ff2a801a6627e467a14177bfa26aee93fd057d6063eb387c0d6200000005d6608ac7ff16e034e40d615182f30969e8f9fdc922b496d1eaf99aa5b71bfdb40000000a93ebeb7a23bf78c6f519906ff9070f03cc6b5432c16448bd37dab378575cec624b757bf34819333efb74a179e33ef3c7ff6b4622b9b0c7809be470bfcca6056 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50731a2bdba3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{560E2D41-0FCE-11EF-BAEF-F2F7F00EEB0D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1616 iexplore.exe 1616 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2748 1616 iexplore.exe 28 PID 1616 wrote to memory of 2748 1616 iexplore.exe 28 PID 1616 wrote to memory of 2748 1616 iexplore.exe 28 PID 1616 wrote to memory of 2748 1616 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3636c3627eff6c07ca15cfa08a661d81_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cb3f15af707acbf1dbb2bad85dfe4ec
SHA19c71fd05e811b6d1d258ab38bb1a0de160007083
SHA25692d3975a29af2b286cb3b8cdb90ae4dbdd829aca91a4799afc5ac9bc5ddf4667
SHA5127b2df9108615a9aa4bb1e9c7fbc6501d7918e781692c77de258f4cd72195aae034dc653a24f42f1e7d4d22120863585b001375cba643b17a4a07cc979e72dd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ee3c3c43e5884676ead1c510f46b053
SHA115122cd95ae9afec8af9b8ade40f031fb5f8198a
SHA2565e3e4cb56ccad71fb1080e4553bdf8cba54ac3548cd10d9732e7da482ef1fcf3
SHA5123bfc6478a83c6de58d89aecfc891cc05ec4dabd0ec39dd995bf35c853a21ff8adcb40671434ad84c0d9bb377407d8323663836fde168e87b887397cdc8ca54a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528c06788448b40aec46f2c2477acb671
SHA1bd58c4b60aac4446ca8e75cc4cb2d72ec4234a5d
SHA256aa685f8010f7ba063bce5b93fc991a4729c6626eb2ec0142a44024ae72fa9be5
SHA512ab619aa58f84ecb4a2a90743c651ba42207ab0d04480bc9bf23c935d7fdaa3ef34ce36826be04e58ed50eced763240a562378050168ac93d00d2bb7bac54fa8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a24ee06eb32fd246614f4aa23f379a3e
SHA1053ce82ee2df5a672a56017ac4417349f9f9c3bd
SHA2560bea367cc70606589538608e8ed3bf3986790f61f8be823dc40a65d7e9341e44
SHA51241dbcdb655947ee12c7ca4db6bc544a66b0da0b1220aadd54f145fcdf1e358f291497c9035af917be4ce667b804e3d98fbdb4da33027b8e327c918a9b79aba8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51774cc6693db886a8602b499e799d57f
SHA1964a686362c74d114afdb692c3ef7e1bdd386d17
SHA2565763eb0aa4c17b0a04b34a0958c4dd0ce1c6f0c8377a79480a984c7e755d4472
SHA512bd69af7b06b12d6f8bc4046682cdf69f308a2159da824c977f631dc8ecc2eb09aa873873d4abf819283d8d646f472be60897048254003bfb527fad6b30e029ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afc241f7bd3492d4882ebc0aed81cf4d
SHA1b108cb3c145200fff08b19685716d208071b1fa7
SHA2560e606c6c071da43b5d66b7d91a1b524e676be7819b8a74e2930b514ecedfbee8
SHA512fa36255cb9ff575a5c9574c5e9f0ef32e7c820212b7d0117cd427b8846f5c1995f3b703e1a2f9309d5785437f87fe3084566202809203614004e3cf99937e479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db9fea9badf5ec2dd37f573a0cbfd15b
SHA1a0d44a6edadefb3d9fa77a522e54146e1b684e54
SHA2567ced2f5e3fcc43bee4c425eb0250a6a11998ba3614302885a46e554a66730a7c
SHA512ebb039ec275c4b4c2217b16dd914ff0123c2f692b773a99e1921368203dcfa79af41a893f7f5f8bc00e78b1022dd67e5997c9362b5548771828574023e1d56d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55569e9cc68793578b811e08a7df5d9fa
SHA119b673712fcde4cbf161806c083b319c1ff8cc47
SHA2564d3a140eedfa8ed9c3d256a0951eca0ab082964fe4aeeb64ef79031c20b88bf9
SHA5125e466ae05856acabf2e689514d367b15f037aea40c4c70059f2c48e4b45417a2845a6bde23d0459edd9bd66a9cbd24214463038281afba6506c5e0ca89f15602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ee8687e33307f38f024f5e80aeb0899
SHA15b8b9c14c1a7d1ae59559d2cc0a9c06a58a3b34f
SHA256f5c7b73752407dd2de37689a575789a18d0f7fa88ead42ed4e9b7ece19aa584b
SHA51274a232907c72ccf0ac7ede2551cc1aa7f88677ee33734adc1cf4f0a987cc616f15cf1e1fbea48fcd8c83b8d6bcdfeb04fcd00201c444e5c22178aaca5c321013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533bed127b3dba2f7dd3b356fd2cfc264
SHA1996307be75c7f6fc98184745c74bf3c02b355f65
SHA256ffb65fba2f7ceaa439a4509c53f6ef025d9e2bdef32f324bf5d0b8c86b7ccccc
SHA512c0f65947326f5eda327727a9b2aaff87a7dcb16d8ad4414561f9f1defb45e4c595bc80722a46a2916e2058fe832a67fad5188525039eb2f5a4bb932d150f6350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6ffff09ab4d42bf372b3c27d22a80d
SHA1a263f640d1f98dbd093553379a07114c6403b519
SHA256482f3f077dddc5a55cd9fedb7b8a73121959a2993dc6d32a7292e8f4de7bfeb2
SHA51253f3d2b927a0b9f99e1bc7372bfb2b84b8f8cbdd90b25e938c5ff6812b740f59b55d46924eee2246b90e1b92597064a38f8135762ec72dfaa94d18b1c77d0f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bea7bcbb0dec07cb97037c2b73ef15ac
SHA11d75f119df6d3052e403aba7b3ccfe74ddaf0524
SHA256d6d764213f15afaa89aa258203f6d90201b500ef60e365cdcae6bbfe1d286567
SHA512dec4912a085f96d80f01080bb899b8aaa5dfd3aedb856df3a19183ae82e9676d0cf1446a91eefdfc50b6470e8ed3fe734a09b1882f459b13e855d07eae37f037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5903700b7a9297c58c5f2417aa38eaaad
SHA1e8db46bd9777c867b438e1aab50471f64997eb3d
SHA25684be2d5ab2a5a9d5a8cbb501e8d0320bbd30d1738b549951a9b51a913c4cf22a
SHA51221f9910962a603849545b2580129a5c458db75bfeb05eb971f18eb28e915537fd99b88bfab4f2489a91c38fd30efea422eab74bc9129c64f2a428aa71b47a9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a850cd9b0fe8a905ec691ab4a5840ce5
SHA1eb05e3b666533d1c0445742c2c5628c6a89859c4
SHA25642f3d57042aab1dcc5ec1691ac2d1496a2ef9bc094c73ba6cadf07301493fb40
SHA512ecc85a725dd4682f99e3aeb1260830fc6327c0d0713c3883512dbe25b2864d38e16a3c7a25e5a1b58fc6066bc5d768d4e8a0b210af96b8d25f0e593b9a37e935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddc2c3896e16f4439f806eff0ded6995
SHA1283d739ab806d7a8cf9a352c4bc44c5ea271f9b5
SHA256f49de7cd498c84dbe7924e3904ba48f775bcf5a2504ded66b328d3199537dfe1
SHA512d995a6e62a8a23c19b1ae5b5af0526670bfc5f1741b968afdc6ba2a1e111b659bdcbf81bba80427aaee56f4375f8ae67d4c52192a8edfd86921054c44e9aeda3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8740c0e761bfe522f49112caca1dd59
SHA1f07869e479b40ce44d95b2d88952ba26dd0e5010
SHA2569e3eeb1669a1f129c0ecbfc356dd47778800dafa6ad6595e48e70b4b73af8143
SHA5128f4847136b48952a6206703d6a6cf8a946665158b77510354dfc408cc9372fc19ed1565741256af6fe56b0dc7c024bd6e998da3ae9d33198c48d9c5315737994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c59dabe3979b9f46dbfabd5d87304b6d
SHA1053ea7d53a4c676263bda5958edb7cf4d8c95662
SHA2566631641c702e3c883b20bbdd56a1bec234964d4720aca5547ebab194f6788d82
SHA512f49c78a8e0954299adeb5b9785b36aa4ceb470e443bfa29167b7d345eea14dd0fdc8874d7a822725638fc2affa297140e70aa730887b1a471c68a6b1d7875560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c552bde23889571c0b2a2c1048deec75
SHA181ed5bd654140fc95e1376a339c0f70192c0ad2e
SHA256b1e29d63f08caaedafb3202fc9796c9f609a2a4a947aae715d825ff3ecfa8ff6
SHA512d9f502c28adcfc6e1f0dac140bb51a4bbfba1f2f8fb9885ff7c9b5097d5b1bd15b72489111303ba8ab41aa87754fa2ed592ab9089144a93942a26a2706e28ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f34e1d2d560e81c10cc5b619c4512714
SHA1bbc876c80a51914103aa69deca9afc5dfcb0e5ac
SHA2569174d8f375166d00895f48dcba573921a5cfc436b9e3ba70685d22bb029c17d4
SHA512bf975131f6619ac7f4918dcfe1fbd59de8863ca821b08a9390109476486064d93db794d17e07d01c2de937c9edda2d04c15a4bd3bb5235dd41afb73113f67d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f5aba5ccbbd1db2f4a8e0496117712a
SHA1d544980474d318616433dcd4161d5c0ccc3bf40c
SHA25627a5af5c4a871b32896473af89227134fe0814e55bf7b4a1499c0b43a5cfc198
SHA512b0ea7095f77e03e798aefef2ca200537713ae02d79a0255d40f54d065f9977fddb3ca0cef418892e6390312b5f83b781e898b3c8c1651c1851c6a72317e8e28d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a