Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
37815a99c940dad9a79ce612d0e50c2d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37815a99c940dad9a79ce612d0e50c2d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
37815a99c940dad9a79ce612d0e50c2d_JaffaCakes118.html
-
Size
461KB
-
MD5
37815a99c940dad9a79ce612d0e50c2d
-
SHA1
4370f25f0e6f1c87c4177af2ebe2502740514fd5
-
SHA256
2b95ee2618efacc8c657c56a0119d670ef9346928de38b5f7d4b16543552ad23
-
SHA512
6a5e42953ff709a2a96f438bc2991b8c756a115db9c38fdffe2d4a7ceacfe1c0f4f49c8481f21e41d5ec25137e23ac724135136d2c1c4007a113053919e00423
-
SSDEEP
6144:SSsMYod+X3oI+Y0sMYod+X3oI+YDsMYod+X3oI+YLsMYod+X3oI+YQ:75d+X3Q5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F75A1041-0FFD-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c9e1cf0aa4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000e7836b54ec147854ccad6f2a1e04c6f14350f137250849480a3f8a8bacbc85ef000000000e80000000020000200000009ab8c73b7cdf82fcf3cc283225480f70fbd3154c5b6f1a1e8bcfc5f62d15e0492000000024b1c56f3d8e6fc513c58aea0d6eedb568b4b0c1a596692cd9f04fe7e38506fb40000000dcd081975502a385114403548b8e8a19f4cf60bb7a33a800285945c0abddd2ffd1c68c8faf9f3dd45aa5fbad52c135e3b7f01b623df1ebc5ad349fa4050b7c67 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421638759" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 iexplore.exe 2476 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 3012 2476 iexplore.exe 28 PID 2476 wrote to memory of 3012 2476 iexplore.exe 28 PID 2476 wrote to memory of 3012 2476 iexplore.exe 28 PID 2476 wrote to memory of 3012 2476 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37815a99c940dad9a79ce612d0e50c2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8f303a47ab921b7d5ce7e51f53942da
SHA1a8ccd702025ada4c7a5bfa93d20ae41599771244
SHA256917b0a43b7ec077696f7a9b015be028129a863eb1a5e8717805c1ea146319e9e
SHA512aef7cc46eb9db210af05d2e5614b4a787fcc30cd80997110d0f704169575eab7e220f5f7750cecf451d030397cffb7d2356e27be763c57a55ac930b20f7d4e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52701eb4318fa8fdd4c716e9dd23113b8
SHA17cf5a8325a5b910255a5ee4133774ac84cefe853
SHA256a9a1ef01efdec84029b06f76953baf015c68b81607aeb1dd21a45359f3c7e2aa
SHA51268f5d02ec6f596773013f83256be332ec4cbb8e74a0bea099d625787483bc081b55ee1670d2da54c301a34e17b8a21526c079ef9fff52f9fe735a1ab966ac74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d593aba1bb9a4034283d678a4cf47cac
SHA1c5798bccb64984824f2be3749d812332e3eadf09
SHA25604d9c6c58ea8db4afb84a6f0939a70854f0107bbbded75b46aff24f8ee28081f
SHA512c1ea21781dedc775b2da1c54a8089fd548e138f194cdd76b1420f0de72ee087d9dae08bf8c52358c962a6f0a8c0ccf74454aee07eee67d678633246c3db5d8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5446238a3004c5d61b3405cdc1e6cc2bd
SHA12b7499f8f4b8c064842018b7924e49d040a2b738
SHA25610a8d21ff68fdab1032d848fc2fe8c0ffa501c84880d8c2902173f660e696484
SHA512934360ac1aee03574f8c9f948163e0c1720438ed732c954a9e2a487ec04dc631617fcd0e5d26432c4cd9b872da8409c8954deaa8f96be43237875a1f7ad951e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db199d85d1424da343f4c08d843f3739
SHA1352830de8d63a905915e8da662a3c8ea42d150a0
SHA256a33b0eb3e7a9aa9f6c7a008de79b68ec82949ff8389f927dedc35a09535d2b29
SHA512ccef1f15782ee2e7afa74f39bed92f0e3a80bddf529a11cb5e98790cf027e4e90fbcd76898ab276df6518fe653da3d93bffa6876694df197799368291c8e33c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550ed25edddad9bf6f53fbab2a4aeacc0
SHA14d7ca7b4fb792b05f4508d15fbce13a5ed305720
SHA256def99d067a2acacc15e4b1634943cb0a22df67536df3699d82bbe20abb928018
SHA51263d46cd6da2dc74ded978b9d77a35c01bfcf6c2deb3e947dea45fd87a55a49f907bbcc3ab6c32bbb337248d60bac21272f3593633bc178ca61e83e085fdea4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af2bd59a75764c39f5b6972d2d98f738
SHA18458cb7f369ab3cee4afc6962290cea8c4e4aea3
SHA2562eb0d293a0ed03829b195983e06b3bdb49253960adccf4d48b25f425e60d169f
SHA51273c33b8130ef9c4a59a2eacb8faaf541c1df48f7ca3656cdc14b7289f1820ef4884bef03ddf09a81db328854de7cdc9f3b017bfdb1639ff72cab83dd8266e866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fe3410040ce211429cb0b3bf1ba6c6f
SHA1b0eb93be948b0ccf61cb5465fde817dd6247393e
SHA2563466217e840886464204c37c8de3b3b024fb65fe401adca453e89f98c6cc0e6c
SHA5122114a513babc56d90173fb26e383f0c7d6128100d6e644d7c61d39b054041babebfaaff500a71c189a97fb0652f051d099a05488068d059b2e4b2a4598b2ac7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a6584ead039972b6d97f4b41a68ee2
SHA1d07484093acc1177a264acc8c155c96e19087138
SHA2568a2e8bd09c1b350357c89995c32e8ca45ce505063842c64261041f745bde5a00
SHA512edd9410eb30204ed8fce6ef856d912170033a13a072e72df92f2659afaa33b1116cd162c62db79e6b6548348cf47d3f9564d5a3f58ea1d435750af53cf708633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a48f6947b0a777589b096ce563b07f4e
SHA197cd584688d1159d07a0a9de5f6ce814a2237275
SHA256c0d60beac8e7e5f01b82cd7081f3b965721fcd2e014da8345f9f07a371c5803c
SHA512e6581b415036c1edc6ed0f3cbf2ab11fa0048ba6bc0e9669d6be7313d3229157273dfd016994e8cc888b87f3e2ee1134b3e8f30dee1f1e1864ec844c50b82727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569111d45a290796d85f112f69db9330e
SHA15dcfa7746b44edbaa15154e042ec7ce8d9f0ed5c
SHA256161a282fde8368c6fbaa9305c78635cc35803195e2f40a7d91bf68c5114ea0d8
SHA5127131c35f221c6cc83dd6de0a30093ac10e8842dc9be17556c73e245fc2b781e3c803021ccb29be4c5182c526d7fae4ed485cd36758d57055e08d032c3d671d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7f3160964f7960eb840483c48bb386b
SHA1b3cc0bc3086f3d7b200d88dcf75a82dd08acc62a
SHA2564ae6874207e83d96ef37d0fb0454e433ba7b9768b9f9d6aaba66146cfdabf277
SHA5125ae41ab871315061ad12533bdbbd6231f5da6d2f57ba37aebe1da9e52efefcae4da0ce9bdaa8f0018522c21a5e00f93d0eb34182a25f3e82cba1f198ff6a996a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c1ea04581e5baff3f554f7c730be3b5
SHA1b4d6aa7e496358bb46ad86774378331a886e889e
SHA25696f1bf9a7a5b0b2a80462a0f8b0ae7a824b4d2174a6af32e0834ab7f810ed2d6
SHA51232faea5ebbecbdf66da7760bf3af14b8d4653be5fb0b5a044e7fb5ed71a4d2b9bec82565c2e4620d649aa1960caa0a574e04caa3e23cd6341d5c2969afa17d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c1b0665528819850194470676db73e2
SHA1cca8bf611c8119b4fc92dd931de47c01fcba6634
SHA256c03719814f88922819f0ccc4ac05d0300d5ff47249b503591ece1a266a16e91a
SHA5122e621c1fb0fcf6dc6f4a3bf8ab2d09d2d9e44f1cee965d75465f05842650bdebff5ee7bf4535d7641a954667c6a6f8ee82c6e37ba2b84648bddc0c39d36d70a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5141f2514a2d42097f09639d8c5934fc7
SHA16346bc7e468ac0cb10f6469816c16176232c3715
SHA2568adf58dc5945b5a2ad46781cc6bf07bb92c0eec1045090e6273fcbfb9d9eaa23
SHA512614021c83afb4e44c1cb963ded7d7d150a3b8956e4d79071969cf9550bfc9b4295573d1868c76d40fd36293c224fc9083db4b5f2e0624d185e1bce4551cdd6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de48144be3d9e44cba309b246f5f4a07
SHA152f4a670ac1945cacf88d6d31681508758fd222e
SHA2561a5ca426ab3816b6251b30d7e9b5c3357b72fb97bf072c0f648e61b94075bd6b
SHA5125729365af1f8adff5711d2187dba64dc0c73b29a86c961e66686736f79aa21cb84d0bb33940e04d5000f6f0f3f31f970da15768177d290b8f5cac6f69e257b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51701f839cac6524a1f27f9520cdd83d2
SHA10479e4105cf4ec42fa3344574a585e12ee96b1e1
SHA25617844c68a882084334ea8360173340ca2a0ed9fdff71a284e81b3b2b4b711500
SHA51201be6f3cbd5c2295963b0c374a4b023212c84cf8fca0ab22349a53c5f6a68ae766653591e235823fb311e18798ceece20d643af32c1c0eb6264fcf29f368a7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545fbe6f10e39a449a6e79768020a12be
SHA10dd3812aa6790fda544009e0fa351dd5b1f06f34
SHA2569b01ce69c3e0fdab3121319707c958fffa41e03f5a9e0a637c67ae709b914845
SHA5125d890374a474d960ad787fa0514c1a0b58a20b8f9e7a554858344ae60d3da38191b9cff28f43549c5394e108af5bb5d0ec793e10a098c470da48fb9ff35391b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d667a4ca6269566dc7f648df2de9d974
SHA10f4fea8b1af5016f6df8420d196e8a3f3efe6e65
SHA256592a08715d4cd66a3fd9f94baf245d5ea18cd302f351d3ee8b6e531a1300affc
SHA5124d5e69306acf6fe7911dc801f307debfd6d894b4a6739819d0a3e262820f0db6a477e13e28bcb136b78f24e8cf8f0f4dcd336a7a3b552aa3df014d45fdded6a8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a