Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
37770e0d87ae798947b50ddf315845e3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37770e0d87ae798947b50ddf315845e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
37770e0d87ae798947b50ddf315845e3_JaffaCakes118.html
-
Size
181KB
-
MD5
37770e0d87ae798947b50ddf315845e3
-
SHA1
f3faf5a2cee5331d0b485b3dd7b9f1e3209e2aa0
-
SHA256
335317747596a1923b93177b3ac01f9bc230218211950e3954cf3e087e71f9dc
-
SHA512
4afa0417bf1e3bbb58f45f0cde6e5ec2df79e2c2e281d5dcc53253317899669e1383325b2948d5bcd9ed75d9347a0800661a05b116ee29aedaebb22108180752
-
SSDEEP
3072:1SjyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:bsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000008dd2a088a787fa13f0ce199a7bdf8c070c9ac201a262e55e796074db66ba99d7000000000e80000000020000200000009a47cb32c48279267a964a899a8d7d4ce81cf27e64099bf312877d19f52a85612000000084e18bffe2d1a19461854e5c186c717c8790889e48b5a24d8adf00c9a9ac1d214000000086bafad6e22991c99ea6ee0f0187c425bb2af13c50280942d365e37a5c5d676a7e21f418c00585f3ea2037acd96572e6b0fec50a4f9c08f9887e4fb8ae55c846 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d9762f09a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AE52A71-0FFC-11EF-9B89-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421638068" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1992 2868 iexplore.exe 28 PID 2868 wrote to memory of 1992 2868 iexplore.exe 28 PID 2868 wrote to memory of 1992 2868 iexplore.exe 28 PID 2868 wrote to memory of 1992 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37770e0d87ae798947b50ddf315845e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56237a0199992abd6f42449ffaf4c7134
SHA17a6398cc369b2b9f4013541fcf8dcd556307cf28
SHA2565c3261bfecb99ad0fcc9ae3dc5dd6af6e10964e663f33df8e88f6fa01a7c7525
SHA512af97def8c730da1ae30623cca535407b6b195ab087642fee2c6d1526b83f0c3a4747cdf37b841ec83ca36740f7b77ffcc46d8adafa13a187ba0c6653182cdfaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57843661597eb2b88b94202a78576c541
SHA1e9277ce4ed5c01a9fce3f409281ece29c8c456f6
SHA256347b12c6ce35accd990f9d7ed8cddc74c215f9172e0d1d62b8e595c1d9d2a6bf
SHA5125b58be6b7c9f7ff2c003286003f42ebb7d6279fc1325291ab87216cb8cfbfd68e74d33759651ee21931809fd6a97fbbd1b32fb83fa366417e81644f49b508180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9c436a6d975f18e2df1c94b0d6546c7
SHA1281513a063b90559687069ba83805bea16c45aa2
SHA256e67835e04bddf35ce7f4ca139697e7822f4dcbd6dcb2fd3dd5453c2c2485c3d0
SHA5123b14a91575e55df1e801bc7f231fff7e41167009caf6932df1a8797ab653ca900e498902729e8766dad7480794fcdbb7cc85d3a76a18cf7658769148db3161ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544b9a9cb7ea8d989299002a846e8290c
SHA104d489ebf5cbff63bef983f248f8e66fea16e914
SHA256ca41c1b4ddceb4c8be46597749fe9ddfbdf963972578761f8c2aa2d1660427b9
SHA512b473ac7f6821011e4a0a672213729a5801eed56eda98e52202a2eec6f32846ca977a6b5c82e92b1ed83b6aa0c51dafdd2e31e035a8b05a0fabd6a67a30429bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bcde98740c71f7d6db29ce4cfb3a1a3
SHA121cdfdab8d753ed03b9a70b7924601eaabbc2520
SHA2569436ad76e0fc5cd6814d017a7f9b84b65931c324a3b8ed615485f0dcc8dc40a1
SHA5126ac655ff3542e329e3d167051c8483e327d4d3c45714088f1e305e50d207ffdaae449bf1dffa6043764782f9d1467201d493e439e3bcc3a4413037c25f2801dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54380735db4a475568707461f0ee84981
SHA166bc220d5dbda53a0821187509f87a9b83711bf6
SHA256ed0e8571b92808483f8e614bf1ef266f7a5cc773b54b7ccf8d1a03a6c205ab82
SHA512998ce9a5bfc36584f3cb80680f0ece49e19a03dcce6156ea261c99b2ea1f92ce4fc645e7f2f17cd2cfd9f74eaaf4429f8d79f9fb4face1d01b35241c5a8e3724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5befd960815c9c5f9224b20f9181627a4
SHA140229144b5ce01d970934e97fb5029cc9ba53732
SHA256cced6be4491974c67ceef482f6a2fc404c924b711388bf7d9b077563d0e2dbf1
SHA5122970ad5638084d05a33bb9f846e4631941873233d7f8d9426b7491dcc1841eef344df08c91fe5cc3ba542accb77f286b2399f86cd9647e3ae4bd1dc66cec30e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb9645685f0fbcc3014444c6441485b1
SHA13a1bfd3be7ca3578c9a133ceea9cda51d472ae53
SHA256d81fdb00bd8a4a3ac19b834a9fdbcf95971e4d590e9cf445206902598c920032
SHA5128ae1995ab94bc4dd4151e25f1476ebba44f5a42c98f110455caa13b2f0657be796e3ac7523edd6fa62f4692db585d2a4b42d3944d5ee2a75844e935fa2379e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5975cc84bb46d41899a21f348f511797c
SHA17d039105a534df1e5cb665771aab238aef758f7d
SHA2566b91ecbcbbcbbe6055ec3885f890c131ac71e8a67c1bf2325299e451b3a8a999
SHA512f697f6a557c7096851151f2dc821fdba63e25b6c4c546df86d705c4529126696064adcb820979a69a72777ae8f20d215324c43f540d6e4e829973d6a7911b3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc8f0546df9d20d42850b73b08605a2e
SHA19429a24ce658df372a0a55d1e7be4c6efc916d21
SHA256e14492481f4fabe9f8ef1bb406cfa13f23268fceb80e65d88576327463fd00a2
SHA51227060e4d0e4cd7f3522a4425339c3dc28dca5c2d406648d5f049773af8aaec37626f6d66b82f25ef296f929f3fef9102264cfffbcd9b4eb2243dce7d990980b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530ac0739ae64d0aab5f3695a4bb8c8ba
SHA1202b6c71ebbb695051e53015b7ad1ea2f8790199
SHA256918df507b29f2fc896b8278f23dfffe73c1e75a02af010b801c999a5d7eb4687
SHA512df75180d302ff7bf1d27f756d4e9d481a7e808e7fedd1a8d378ba65c35f04d71aa6ea0e00cb2372ad3b8654f25b4228c51e646d08b81dfee99aed3f6d9355799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e368f38d2f419a21e2a5287911a14bd
SHA162be6627ff9eecfe52682e817621f024b6696f3c
SHA256f1d3229722fad8552291106d0b1fe1c1dee00971a2b259907be6b7e51db3ce69
SHA51252a6a6f9e87c52ec2ebce8b5614ee41389661dcc81e7923ffef9ecedf7c62c730e521ddd3914d5df07a3ffa1b6141a5c195b37abd2163d65f61f69810d3081a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f0665b243a3039de232cf142e86475c
SHA1540c2c6ea2a94df373c718e59a4114c1edfc887e
SHA256b4e9b389719b96eb8ee154ea50991e83cdbc93fe8fe5cb7a8baaf3a91e46df7a
SHA512143edd1721e6a767a076f419ed03f45e3c6bf1a5a97cb9e4a8d01cb4712281d00ac57460dea1e60e030ca704b141a7c21e33f595d7259f4153db8968c7efa884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5447fb0c7a02467c1d323c7f87725778a
SHA125a6e35282416102262ad4ac31d306800fafd799
SHA256360196356a3d96633eff64756ccd3eaaa94b75fd7335be9280da638c5c5c8095
SHA5127cfe88289487fdec890fbc4497d5b2931d3b2d0eed947faa4468731ddcf72701f50c18a9b0a8a151c386ced60f722a98063703a11cb5d36edb7c020ca222b067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ec983dd451b8b9f1a911cbea706ebb0
SHA15aba5629ba7a0481cbfcada4e8cc6ad492fee464
SHA2568a53f38aabb72059099b6452e04f72d7fe2d5c374f0f4ca1ac824aefaf11687d
SHA5120772888386ad9af504dada85eecd1238e97ac7fc9aa2c3913c97885235db1118a41d83d9e45b93804be8aef4fdc04bc08e800734ba53f7b93289f1cb653c57cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc18427ed8393869f6399ee6925fde0c
SHA18957b0345604bbd349ac404ed5190f463e8af780
SHA256f0f04f2e15bb17af2119888af1fb66278fc4e4a3732ca917fdb726ae5fe2dbb3
SHA5128c300ea97a27b7a9a52d34ce883d68082642d7dbfeeecbf9db867aadc728b0040027e44374e96539e2ae9c478c17c4c6a4ae8519d1ff369d11df29f42454544d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546d3903e8471bf77f788ec27606a1d30
SHA18889cbb426a1fac2803ba895a3ad313f9995c9ee
SHA256daca40d4a24205e003c2806b8e47f80d9a786663c10af08e5448b25dbaa878b7
SHA5121e4097656e440dd31afc0ec66ddd3f2ce2c2c434be6e913886296c0655ac16574a134f11de77f06ff15f849d21d0f4005237e7f08fa3b2ebd58e86823d0a284d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9f518263c01e31ceb87a8c911a6d73a
SHA1c22bef6e70add413c05b1e30a9c596b54a5a39db
SHA256762a1541aa96ca301a12071b008f6b9fa238ef9b27b95f2cfe3d3a9189a03071
SHA512f76114e58955b9dbfe98b3dafcc508a312829fdde31d85a57ae0e6f1b0968ad6f9508a810c1682157e9730b10eabba52fd76b3e98c7e094817d46841917f8751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc4876e5ddd955a026f8df98c4883119
SHA146c5597e82343a55e91a9d5732df52a1d08fe377
SHA2567c50defcfcb27fb247f1e25baa1ec78ccf72522ff8ee79e09a31326572c970e7
SHA512e44609dcf7899e845890530edea4c284cff2b15768bd733b52f31fb2af9afe1db35b6996d146d5b9a5af0e069f180dd942b1361e024423c6610c91decb877df1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a