Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
36422ff162bec31dce349b7829f4595b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
36422ff162bec31dce349b7829f4595b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
36422ff162bec31dce349b7829f4595b_JaffaCakes118.html
-
Size
4KB
-
MD5
36422ff162bec31dce349b7829f4595b
-
SHA1
45217ca94dfecbdb6b5f0a86224361387412ddd3
-
SHA256
4649a62a3783426a976787799ccb67ddbc03f47414d73562c8a2d555e7448f80
-
SHA512
35d970d9ace9171df8b76ee3e5cac3ccd05ca1e056fa91634b8e96cc04c1fffb73a2418e54404acae5f7ba7da83cd200cd2cf60ef33014548e44cceb0e1ee5eb
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oKiT8+gu:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5E55471-0FCF-11EF-9591-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421618946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01366aadca3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000000ae301827e7830044e635ebd6619931a62e69347f1740019add3fcc7ecfcba2b000000000e80000000020000200000004a79281c4bb7c8549bba42ba1fbb58618128b1db98e7e1ece2da7606e9e0c047200000001161926544fe9f2c3ba0efec0e86c6a7980d931c5e44dae60f265c32fd3ae64d400000000690cbfa88c8612919cf153e564c685aa2cdb17a2a41a8bdc69167a0b664f30af12c0c6d44d1d0905c7bd2feae96572a7f9ba04da48652f63166f6ccaf4e7552 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2528 2968 iexplore.exe 28 PID 2968 wrote to memory of 2528 2968 iexplore.exe 28 PID 2968 wrote to memory of 2528 2968 iexplore.exe 28 PID 2968 wrote to memory of 2528 2968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36422ff162bec31dce349b7829f4595b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c608b2edefa94317eaf2698d533bd22
SHA11d0ec2b5b1c4d05b55147dceaba22bd488ca64bf
SHA256ca1eb59dfb0fb6651909660e81b45416e6236781974c2fc8a15b39034c33274b
SHA512ad104a253f16a0993f7012a02dbbe7b68caefe608b6088e1c278e29d4d2d436770868385531154a60f2e4fc1e4c90ffdafa2193949d7abaa315266ddb16363df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c076e79463146a4aa5930eb56343103b
SHA138cbb3eb211e37081c9a58bf249b6cdde577faa6
SHA256994967bb7672c82ed3e0427f503757594e737f0f088b4b924ccf4714179d340e
SHA512b37f96eb5ea2ae23cea814e89759390c41759638335a73199ab1e5a75767467bdbcf39e246ea421207e7867d1fbb1fdc80ec602b5ef847d774068f14e523967b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5078ac25b17f81e25ab6c7bd09d7132bd
SHA1024bf4aa4589ecbf54f19021a89c5096d561c959
SHA25637e7fb371796f7f93456123d996c9c84f7bf56b06c252a6aa318a7d824b35105
SHA512ed40110bea1bebd860b85ea168f60f4c08fef3d5a6c518dd57a6cfd33ff53109d8db1f996342254983f1f2c2a27014d6797896a6810142b1913cbf74efa20fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c817d2380160d51929b85591608171e9
SHA10e5b8a6d0a320b7cacb0f6491ed7ccbb791be22c
SHA25644b11f0be73af9892154f09da2b0f0974ee2805ef42881470dbe061336a5bcbc
SHA512e473dc4f236749b08f68498c280c7176e3cdfb95744a5c1c34de2d60f136fddde34ba0b1201e1c7f7b9368d43c66781cda20c579cfa3c66d3286e1f9b0446d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513c6b125c5e8a6e66b03a884f1ea2287
SHA1ecbe5536706d11e2e7ae25cef30c78f7b7e916dc
SHA25692657778c633e1882f4af7b14bde26c14035b74b87be4d80964a8a29dbe97999
SHA5120867c25dcf9560f78cc3a34603de771523cd29819973b8824a5337b727bbc4a3ddd3c8706d401c73605427640f6bcdf521b44a2a74a9988ac19415c83b492fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be6ff5200bedbbea702acf9d7102a175
SHA1ab54c8db26a5c5aba2fd227c1d3934c4e7f9f5da
SHA256f059eb5409fdd99df0d3bf9a5282daf59aec92a45bc83afec13435c13ef997fa
SHA512ca8f136be68bcdbefb2271c4f2baa78e2ac750ab8680a796f5a239e01cded94e943686dae5b3f719eb83d17b55c10a78b99f99e363ad485bb60fe010178b1e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588ba5b2c8f2e987adeaba1499e779898
SHA1c8dbf84a13c897c3f001d01850a977c4238acc86
SHA256e42cc495a4bb76a0a7ec9f46b88534c6924d20ea2abd25c64ca815d0565be22a
SHA51208570b959264a685b5718617d374b57b64e63f920ea602df9edf7f8bd1a9a0f992c7cd9d95867fbff6e2ca99e0df5ef4cb1a5ee08eccd1a9114256bf06254d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5902b9123a65bb1bf7e5d6866b0ccb10f
SHA17fef0c2c4296c07314655a53e463b84f54a95170
SHA256f2be568b40a31c2508d3a4106f5eea913fce9905e1ce27e2706faeb9de5e8976
SHA512cff6a5800aeeb07957a45f237b4cd9be78d400fea8d9bdcc2a5befe990e3582b02aa9ae416e18434451fae3ffb02a7efe8b540372358b2bc907ed305bca6c826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5463535d436249ff33b00f7e2ea644516
SHA18643030148ff8c7eb1a6ebf84836ef674888a04f
SHA256b32ab8ba6c5e82c42117481535db16ecc576049123a362b6f64a8bc8ac5313d3
SHA512f530b2e1a218ea63e0594147e0913b13f3756a8f6f67c38ea2b8a8c4178c78d0a867eb8792c8213689a3ebad7427573488abd4fd7be64185420dfc78835f21db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3c361ad0f1ccfe0ac33e9ea58e5208e
SHA16793e5cecc9591880c59d11bdab64103aa3b66b4
SHA256cac8ad40dd4d9d799065ecd00c4c4f7d8ce2f15bdb2bb7d80d47e4073d8a1f77
SHA5125f3945f47583c60ab9ce8f0aaa5f61a9844c599920bc24b99e4a97162d339ccabe1d978b9e2885291455b2b4279f1147c513bfd7a57984a56bc495c20743158c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900c73c7b2c9ff5bbad0a1aee59f186e
SHA1857d689b0082cba400283bb9273a8ed035387fb9
SHA2569265fc80e53b645c47e8cfe42cbb04c196382cdab3337ce587dbe265046272da
SHA512349119fda2f2a7f87085cf2cda982ce7e0700d7bea9137c565778d2c495eed4009fa22fe634f96687f8de33aab583d86d282e389e5d49e3cfc8229b167c590f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d54b55f989098966e99e2197d44ea21b
SHA1280713063ae9ed54dd91553d35b9b25e9dc4dd30
SHA256c9dea1f2a17f42d54103604eb0c27d9a81f19ff26439affb1d15e11ce0f3313e
SHA512416c80333372fe2172f077e6df4f4705d88eea40a1733e93f59c755d37b05080fb13d48e624c6e2c05a10676d283f072016ca49b5924ba1b6df5a1adadb9cf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513fd81d796a91806a3013fedd6a85c12
SHA1247c092fcc596a401458608a560f4f236f4acb94
SHA256a99433e383653068465688da9e4bb42d6288fc653630b43209169463c4cfb838
SHA5123a9240f2e1733f12f2ae20abc209d28f9af5b6f30f028b95d3ad3ca40b9e7115bc49dd4b3512126ad06a4cd0a33673b9019ab435113b77ab3d42b7accefa9b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad0ad57aae2cf23302e9d3911c71c2c
SHA13f38f2e9d6d40105526886d974e1823d4d485712
SHA25672f3d412f7c30d49662fdfb7beecb177e6fb8930dcdf6cc11a8fe3b155d91e8e
SHA51266722b2cd40fad899348d508eb01312c0c1d30c9c3bca46875e72bc16befe92a17f257322116c7f898c85a62a85901d7454d4938b5bf569a79add47bb3f912b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d47caa448c115285c0479ecbbae2c1b
SHA10514ac4aed5411d8a277e8830bdddebc9b8cf3c2
SHA256591bc67067957142ed6f1b9a53978d0887225df8299800e8b4cf5686f1f9a5fc
SHA512c1422e07b9a57b9a2ae99de0e71f0ca9cea3a61a37c0b243b4d78ed93a9ef092e169eeca4a1462514ea18ba503ccf8d83b727c03471ac8879bb49cdcd9bf8eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d8a430875d29603f64d261d9dc9425
SHA1dc2755fe4ef8ab3c8037b06d6393f26caa90a0e5
SHA256ede290750fdada81b401214a4f54a73e67cc30292ed65ce59e3795a1cb8fc20c
SHA51237ad542e156a52d17872708aea4be0121d91d139d5489e007d0db0e653d61b249f607c3f83bb781a59eee30a0b9ee9c8031ea662c2ccbdb63fb86305258a6aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50de1c34ee0896ddf1bbea22bfa5b5ec2
SHA1325a07b30f7ad4d4fc9635a8b10be0ffef761e31
SHA256c2ed668a963b70e5914e7de009dc0d462c2794d861362ab834ff5cd4aaa2e9eb
SHA5125bc258857848df0c923ef50a840a73314df9e29ddb68136f2461315b16c138160c95dcc4f1120c77ddfe1485b7cc0354f4eb45956b8217b4881e44aba6314a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a386cb8d3902b2dae88ebf9a49c93ec1
SHA12544280d61c84120b2aa4dd110c611148a41c901
SHA256abc803da1c8bde2034e2f66440fdecd3712c2b47de1d63fae33e367ae6649b59
SHA512caaef3917d9ea97ac3d08a5a43313d7c970e90cdc83b168a819beadfca8c742aa9702bd2e56c9651f0b5427f7652b07bd762490e79ae6be566cb43c61de37c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580205530d535ea5c644d93e8c97b104c
SHA1ca8144d88f8bf746778a81db47a7abe9962659e3
SHA256669961205989a2f9b289562319be85fcf607a04d16937f89d7c2ebeb2817f451
SHA512f3b7cdc5d0d1265cbaee5f0698a83e240df88a49886aaf1e273d15a5bad01627d611d7c26dffd46d542e83dba58da204a91aeda9316f796a4a1a06674e04e541
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a