Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
37e8536daa621a7195941df74ed0ac40_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
37e8536daa621a7195941df74ed0ac40_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
37e8536daa621a7195941df74ed0ac40_JaffaCakes118.html
-
Size
36KB
-
MD5
37e8536daa621a7195941df74ed0ac40
-
SHA1
9f2a744be3f4c35a9166a8e032e9d24868f91f2d
-
SHA256
ac6c41b6b28339ded2b01383ac6a56e203cea2ab62ea0a82523e470153ecb47c
-
SHA512
87fb5ffbc5b73eac9782be203d867b9e7f1a360b5c79a6a4384401aa5d19cb5ba7d6b19a4d1f2b6beadbd13c1aeaffbe4d15b7c0b0787789876e8e573c56d900
-
SSDEEP
768:bNsq9ulNxCcYozl3TqGAvrdf63gUBRUrbQ8VG:bNsq9ulNxCcDljqGAvrdf63gUBRUrbQF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421644733" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF957771-100B-11EF-BDA8-6EB0E89E4FD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000008cc66341bbb4a40e39f8142647a67d1a29c84477f024058bcd20fcb94fec80a8000000000e8000000002000020000000b443686f48ea777f5ceb5ea5ec3bacc15b759d64f1fc385f8997852861eb6f01200000003f5b5114411b5252278d8d969637cd9d7a716f6862b739f318e8896d6103555d40000000fb7b1cb006e48d089b4f045cd3408772efdcedf25fe01ac672971aa7640ff51cbc17cb2cccb27025c2b7f7f2bac374f76889f20d2b1445edd7ec8184694739f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e950b518a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2560 1964 iexplore.exe 28 PID 1964 wrote to memory of 2560 1964 iexplore.exe 28 PID 1964 wrote to memory of 2560 1964 iexplore.exe 28 PID 1964 wrote to memory of 2560 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37e8536daa621a7195941df74ed0ac40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512aa677f5ab6e8be725dbcb08dfe7c4e
SHA1c24952bdd5104f97694230038a0053d8cb83f29e
SHA2565ceea03450504bac9335184a48b1306610a945ed1bd120d9bc0f7885e284f378
SHA512eb28e88d70f64e5cc75f48356802dcc04c5b232e98677d62d9448133a3740cfcfb47bcee759241b4103cc6b5e78fc4e1420db1edb8008a0b9611704619915e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb15cca62a400825b11e95df80f42495
SHA1707987d67250dd0240ab663860af452e53488997
SHA25616d03f7d88abedf6cb37da6cfa0f54b62f6c39d88e22ab1c4b289eb88a1952f2
SHA512011b5e9318528f9a42c8f1d1434f3e242c5174e48010d70ca4450ec5cfa5e3e094a6ce18d591d6f71ac10e535fe126a4c7dd01510c559d3223c210ce77a9da89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb9a631934db3055edd6b16dd77b1a82
SHA1e23b5318e3d8c698b653ff14d4ef57e41852dc2f
SHA2565aff67ca1fddd690217c3e236dc113f6b68e057f5c4b44ee35e44bab687f9878
SHA512fbe095aeb2577b0193baede602be3b52a0acde990627567cbb9a5bcb26599785d46ce40d6dd6aa5867d846a8a61e60ed3848134a7526e5a52447cc0f4d3022c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4dfba5fb1fef92deb8f7a8496e9f735
SHA15faeb425a5d0106419e332e1c9fb7c2082de36ae
SHA256b3e5e1ef475e9991fa8c198c9fdd54acfc863585b0b8579924e7996eef35bc1e
SHA5124a6988342edb62dde23779909fad89a00e2e023aad9adcd2b0d460af3d966cc7886f95cd273913ad7ba05df15fe20073b6d1589e08a33d6c81fbbafeea1a470b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4796b6b549c827ec52ef7a705ecf4c2
SHA1aeab052dd04e271e0d8b52f5791a9ccb6103a1a1
SHA256fcf87c7a810f700b40fa9ef777dd7bbd0a48af2e1e20f4dc268496e68003c195
SHA5124790e7c462ba3745ac57e4f574b1cd44d9aaf2f60ca5d21ae423516a542e51e4decca992680442cc9db66596e82c88c88d3a81523ec9095d673daf4eb08ff219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707cca18444dc17864e5380bdfb6c9e2
SHA17a927bf523dbf844a6a2338332580f3d922a2e63
SHA256273325ef57cf5e2837fe167b788689ae889a915f7c7c9481c65398a9d0e7e1b0
SHA512fb28ce9c4bf6c2ffbf87a0f2e16b23047a3b9cd1d2af4c0504b0916167377f632b0ccdf51c4f1ba559383ebc34c0d9e710a87b8a97936e5e136850031740a791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db8acfa7f4b24064c9e20399522e4e71
SHA169ba523d1724f001a5985b7d168d1d66a20347a0
SHA256ffbc98a31f3cefde7a41764d65120a0cc7f5828327e88147100d8a07f04a6763
SHA512c066df7146a12ca5d2b49f5573f9799f36007a158f44fdebcf9164ae57378e9892ec2ef781c18dc81cd466c7152a813370244555ccf917592bb519a083cb615d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d3b4a1227331fdf2cba74e51e43ba1e
SHA1bf69d3972db683dac700d8aa8c55c1072c1168ee
SHA256b061532d31e00c7419cc8b4819f7562752aa401411ed0521c82c8a4b426bc259
SHA512adf9ba9ae97a72c3f307ca288a1e7bf9c3a4aeb8dadaff49d7dfdd825434235189653600c95430115ac4caff9ef3ac336134fd6e8df6b1c7c64bb1d5a807d68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574771ef71ebc37a3ce290327444d8c50
SHA1c26515a201637ec484ad4977320ee51085093919
SHA25675298bf4890e6a1012fa6b8b837a8c19e18f8b9d7b6927fd53e27770a28eeeeb
SHA5124d07cb1d6c94d446b52558501c6a69f0e4a75e1138906da155f9131340a250a66b9fab57196faa57753ab9227bc1b38a5fbd4bb2c67d17f656efbf47cbae8902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50da0dcfbf212cc41eb02cd352b039ccc
SHA1f5c4fa5bb3f9c2fc8de6d7575dce872ffd4d7a6f
SHA256f4d262f309b1a992cb9322fdb40bcfddc2a956e3ae6a188f7d4b632598a745d8
SHA5129a9e052d3569137676223511b186ab598460b52388fc55a9cd1aa7517b9799023e0fb140d8e623d656bddea265509b7eb2848d8622230e2089d567aa0f408e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ea6d3a0fdfa7be3a8fe6a8d8a21f591
SHA1028da5952177f8bd8390a68c7a9dff3780792e9c
SHA256b0b336ec1b8ddf8f6ef3dc83dcc3cc7ce0e3c75653962a2729da1fe6b987feed
SHA512bb8bc21fe4d845b881273b36da1f59a6e39662e1ba1104de27d6e2e1b3cf8d9fb4f66c452a424712faca60886e52e3e6dea2083e779d89db63e991b15f64e324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514f416bba63fe231fa8a278410f09158
SHA13561851c6761ac77c7e89ebf0eeff57535a27b06
SHA256c1d63f046b064f5ac29513605bac9f53a70410bbc5383bd606f0619a3e276012
SHA51226fb77802417b40d00e45e0626ca2506903a4339312100f446e7f0c9dc59ecf4327b2c06c6d016abc3efdf345cc5e07c0a06b46e9242fe20267b63aa452f2688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c269e03088bf7241e6e2e28328b6d38d
SHA1a29176ca426f5ecafe7f73e0213cdfee650e5493
SHA2560525a20b4bdc43bdb82800940664a98579061c6f93239625bff4a5b4c573b007
SHA51287f0cb37733c607066f2f2599332b2ed1a79f8cf8d543acf1ad74cc5c2a021fed5c4fedbada0c6e2be796b6db3ccd110b951f770e5bbb0fd8f10d8dcf2d0509f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddc6bee2ac5d4985c91be044f266a05f
SHA1b116fd789bcf1b81a94503906459cda1c216c9cf
SHA256699d5cbbae864520e93e81b80ee69cd063ca077ca5fd5f9db2a5e55d77e611f3
SHA5123e0c29b42cc22883bf8a016c10b5df8bd254c58dc589267f0ca1562c5743084106296ad6f5b668bb4a49ef74cc71b8416f4719a74c10b81492061e45c4230455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd36fd368cd2ec07b78c123e473f145
SHA195753829cda523170eecede50975b5568c280307
SHA256dc93e2715076606a8519e7568f08408be984b559046ba73011b08a4d48a757c5
SHA51269b1d6fd6e6e26070df9b8023f656603d88051adb064e673ce59d1ee75fe095d8b97e4f3f862145132dae0d4f5c9199001a9bb457d213f09b96e5e7606f3c0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc948be8d7a76b1d4c1563e54ae6c80b
SHA1cded8b350a52ffaaeb97f004fd5af737d416a54d
SHA256ccf01af912c514d98e244261e8a5bb86999d145af2d53ee602e1c4b0a3a9a8bb
SHA5124cc02ae4e3fb0fd8b5a6d7e7828138dbcb7ae423a9d055167ca9e5f55b4b369236d15cdaa7752e66c11bd92619fde0898342284348c7b3b3b05956dbc5a048e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f121f474ebc2c75f1a812b1d83184633
SHA115f5ced83c8c9f11f4e85185d1e6f4ee817f3e84
SHA25603e1ef55bf8266532f41045f8d5ba5bc4ccd7fdd8d3b30fdc34ba59f75ff1326
SHA5124e7e12a2f509c04c8d271602dc95c6cb9e9374a16a811caa10e5b93b68e4ebe208f40f5048f1b76aa0cd7dc978570982ced94d208a80bd23ab8b1496dabe5398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bdc7a9a136489b4faeb88604342713f
SHA15f6423a597f2afb07401d065153403f1a32993c8
SHA2564075be4e8a523b7d3a8b2191544ae56d5fad0e4a9f9539278bc8fc45f68eb604
SHA512c8d88e772d220f98546a82473a4b84a789ce231c7c21fc5c73b5f6b5d51bbde559f41d79bb84924a2e10c2735076640880105ef1041a00298f7345327ce25bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af524596aef2131a8fabee901042036d
SHA1b495c67c06fe569c61cef0267e24cf9b218c2a82
SHA256a2994d9e7c9c5a48601cbec16c7afda352502df31ab9353e4845854781ba7121
SHA5125d9c83f8e5cbf7d4f6d90aeadb3f30e48de0b3ff88836dadb1d760d63a69e09329354f461416bbb13624552941b46ae3a310007661467eb2261ec48c8f8fa07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7301d0a2c9d82953e6036499f8e58ae
SHA1e458a1afa189b702b89f1a23f7d618e6e3961d33
SHA25630d6aa30fe34effd3e886f4093e40854ac2fc7fa6860e7abbadf8b6c87b588e4
SHA5128a7dac72cafc8a2848403331047fa9583e6117d24c0253a7bab54e79d70c94e1ee9aa39c2d0252993dd781a15174bc777dc4c3b62197eb9f92504a68c2340080
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a