Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
37f52b71258c8debd0f6a1fbb7d94c21_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37f52b71258c8debd0f6a1fbb7d94c21_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
37f52b71258c8debd0f6a1fbb7d94c21_JaffaCakes118.html
-
Size
18KB
-
MD5
37f52b71258c8debd0f6a1fbb7d94c21
-
SHA1
a0b958aa8494e2af7d9654fa874044402b6c3acf
-
SHA256
670c58475c8132b7f23ff9bcf6d43744bc40489d8820729c8f6bb636731fc505
-
SHA512
12df2aadc44cc9e21b0d13ecdac7b65afaae8a3257ea76f21ca6db622b209107e77df129d26ab8f621e5f6a8048fcd0f7e1967e6b8bafeda9ac98dca917fb15f
-
SSDEEP
384:SC+4kEiqe5pFx+hREykTOQ21PXSv0wCwwhW77fmW1271Fjp:SCvkFpFx+hRELTOQP8wpwaiTjp
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50312ba41aa4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421645460" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000fd6b95d1cd3a79ba98e9995db59659c70d90f96eddc15622075e68dab103ab27000000000e8000000002000020000000dbafdcbe6ed1c72022d7e8382d9f5e5cc3b180ff343025154a76303de886272b200000000f1c0bf411097e69416208e8316728fe1924ae4310311d9f4124fc8575254e98400000007e52a93fd182b0832cc8802bb79f293717889df30d4a928934511e3edb18e12f551a752fc9996b6e6c0a727104911df0c685a59c8e7ccec66dd83980acd0e2b8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90DFD471-100D-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2080 1244 iexplore.exe 28 PID 1244 wrote to memory of 2080 1244 iexplore.exe 28 PID 1244 wrote to memory of 2080 1244 iexplore.exe 28 PID 1244 wrote to memory of 2080 1244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37f52b71258c8debd0f6a1fbb7d94c21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cbe4a7e57591326b6d49b4a861f7608
SHA151aae6c7954bfc88b75f80e3bc430d06378feb7a
SHA256b5d82d038036eb06eb6816d64129689af6ffae1a60cbc840fc6e2bce95f8e551
SHA512cbc675bec99b5c1d9cf3322e15e7fd1e9c98de5f1bd12bbdf63c7dc737d64c2be444fa0f6aef080575c2bab3262ff738aaefc46fc96f86258ea942130ea4d77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bfafdb9498bd62fd0c5bce1760eecfe
SHA1ab5efd2556adada80f2b811735ac7a7b4c0b662f
SHA25669d3137668cf99a3e0bade33f567ee04062e8841550a2ef8c8caf7c51f974b2e
SHA5128486eac98c4f39c57f6bd342d78b13354d2a39ed5e5552f8dcf495b9026c88d99f96613bc44fac28c8e0aaf6067a521445db75c34b1c5ba51946636e591da949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5462e7d7554e8f9a0c12dddcbdfe35cf1
SHA14288b396adc4d663f5ad1e9174aab01b4c5b52bb
SHA2569bf5f5efc37ed667d99be6eebcaff206a51ffdb8da176163acadea10b5d464f0
SHA512b9b71a3d2925341438bd1d5c70e79cd2c5bebd4df4576f0bf5975cf51314891b9087a2cca2e27dcd267105c71302ab3ede2b7c11362366c46be1efc93e43a009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5227a5ffb267f2489cbcfe74e9805f17d
SHA1dc4c77887a2e1a9d36d5ed945c2885e57357129b
SHA2564f94f3ec7e27882fc3c7d222bda1dbd9b2e235f0f9f1d7d58e96a80159cf9e77
SHA512f011222519f95cf7944f4159c9d938bdd20286f589a3b9ad95ab3198179fce9dc3d223a7263d32255011102ffea1a9a8951fc1c6116998a29b65b1c0c53a6474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d7ff55d3c24f657c2aca538128b6e62
SHA14419bef5f0f589a2fe0e9c93e720d8f993fa1285
SHA256a923ab1d51bd638339581a2df428a2fa892d5b86f9e49b88f652f9b43ebc571a
SHA5125375ed76b643893c57a5fc5c48f7095fabb89439c98b3fe79aa363d61c40c211aaa782d8ee706396d7f1668d9a642fe50356898c93a51ace98c00993184bf7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9fb6478a08c6af172aecef2a02ed6dc
SHA1a849eac723c0f9328b41b3bbe8fb4433f90cc868
SHA25615a9826bfb6aa29ded19424c6ce76ce796d86574f602541849e14f747f9da5ee
SHA51256aa9fc0cdb0ba49566c443815fa4df2b3467b6ec2695458970538027a30be619672beda75d375f1c1ba0676f2573608b60b8df729872d6e67321f895492c870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec85e174a0f1d4fbcc0526cd1e5fc47e
SHA11b0a211d6254979322acf5573861a3c815ebb48a
SHA256f6b2df405b052b69e73dc58382b30c59053014354ba11393e4e209c24f5fb7a1
SHA5126c4b13cafbc62bd1683948eb1aec707b13edee6ff2e4740e2a02840a56d30d20ba253f037d22dfac92b42eb3b438e385b85c7c9aeb43b8cd8c712b4ef5e72ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588f98993dd2eef8da5efc85f649a120b
SHA199d9dbb504376d64466e0a7de022898a05455c5a
SHA2568ff082d2be98c22dde42528dbe2c9665b8a8bf7a99c4d92dc58b35322f2e74bd
SHA5124af5d6860f691f721c61aeaa56e44b8101f60050963937efd2caffe206384751a01cfa50f15f3189e6322a13fe10ccb6f07ddfbadb658cdc3430bce9d0b3b972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c51872c3940ef72f629129ee86c8ee
SHA1b6d6797b5c00f1f4fbb3fba9426f2a26ed232a04
SHA2560dcff1fc4340d05d41218c98bf62d82ced593d3c6c3c5e1c32b40fb09fb4952a
SHA512442f6f6ef7f0797e93bc916ae20a4af2554eaeb70dd37dc0a2992016c4228b5eb8c606c868b3c51912835ffa24503e5a0e677e2f5dd0fcdff2122144143b3f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502385e4e4781b10c6fdc2f427de2f6b1
SHA10be3976c0b4b5289666cf0183c661c5e96e5c5f3
SHA256d98c8095552f42dff412405997f6c3472fc4dd3f78b78378fa760daf85831884
SHA51220c64b7e898b6e05456578cd625a549b75aea3b9a14c74f6d443926d65b5d219ab12cb39e99c2e48010c9f506366cf510644469cecd93e059b984d04bbdbdac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6749e08d7a462458c5afba5c763a855
SHA1f7ec05ac828ac7b970aaeed937286e99129ed1ff
SHA2563b5ebf7aeb06934aabe094f52fbb8c8d43c270064ff700e4b91bff6f166bfc70
SHA51288ea5e0c6dcfa28961253270cd25380a834cb417c33ff42499a18ce78963b4dca367528ada399eb972f268ae24cdf90f34109e0f32bb9ddc15b78ae82158c7d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537c841743b3f03beaa4a70cbe0e25f2f
SHA174ce6bb3cdc8b601b6c7b34b23207d0721b3476d
SHA256f4528dee7856d90a7d555f25b2d6af1dd5a30fea6bce234ff30fb774f2236d6e
SHA512fc8814fe961db91547a5766e7af7b1f9a9d3f1fa4015c169f89ff96f711d3b8f0407d0f6c3be0aef628bc8f0c9ae5c8ff026e3eace4d389843f390f200330c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f609793a1bf2fae32ac1454d4ab03375
SHA138bca2b92d8bf0c369510340f1931a1d1a3f2228
SHA2564d39a55a072143a8dc6bc9b2a52a43364005f0e1b3f567b377ea6db9d6eae2a1
SHA51249d838ab5dbc3ace619ecfb161fe6814426afdf34a1d39f5c4c6432d76adb0a858c4b266a7ef9eb2bea4bdc1b4058ea1c3c6461308ea515cfeb9691957c2f8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5171f0e1eb4e607669efb9dcf5232ad80
SHA1ba2452b98d2d10f2b3008c02cd4d3c14779fc3b1
SHA256d83716682061bf3e8e68a83fcf5ea6b9d09a87c98cfff43ed07798ed40ef5503
SHA512961535bdb0a87ec506f4725e85555a2a6d50c963ca568e69400d4a6a87788e2e016e6b30771ac69a1e6a1ce41dd988618bd5d14002ed1c7b4e1df21ec5e9fcd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac49725bb1db7e615b80eeb20d812b1
SHA1cdc2c3a5f63f6f41dfdc67dec8de36e0c391c5ec
SHA256599b5998c095182b478185c8203e7be3c862ee3c92f5df88b82d28e768d40562
SHA51290af6331ec6c423f126183b6f7b120469043482d8bcf2add2f2d072404f61cec922a119666f64da13b1fdb797d3aeeca714bc12c5d2deccf68031b0a8224cd67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585fcabc60f87b7ce3fbfbaf463bf6ba1
SHA13bb044487879ed8788c6e575e41b2f855b9175ff
SHA256b398270f6ab0b8a88e59916f2139a496aac1a73fd9e28286a2fe574fc24633b7
SHA512b8d00f52022e8ef7bce78220bb5fef48a7a89efc231681ed793a74b8698b7fe6a65f0d44af4e60d28e1a4b53e9a64c607aded243c64a10f66610ee371cee180b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f25d83c1e4477580de50a4ebd52fa82
SHA19ce45b3d9e7b70b48790e0d7e07f7c1e21a8eed7
SHA25697ed811be41e5c89b431d758df15fa58651df71cac5f7d0d55b414926e5e818d
SHA512aa9e9691b35263bf36badc2171ddd43851fa25834dcf63657bc2c1b07f070aff34aa1e0aa0510d71855b458ebaf8afcca7a20529622760eda84258876b42a65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539c67ec061b649840faf92857f3ef230
SHA15e8a8b694c1dfea12cf0f9183223c4deb1afa41c
SHA2563a93d700342d993ec345d262d9205159c7cf5579eae1bbdce98a8eef06ce16f7
SHA512175f5c830f63303b8891a891dcdfe0ab9ed07602424e93c3c05124a919859d4fff361388657e1ec70a8fc35221bc2fe9d1eea264257b765a8aa2fdabde1c8909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515b23c9701879e6a48e86d379646cdbb
SHA15aa943a0a5874a01f2727c2b3c250c04363ea9bc
SHA256ff4fb457c2870fad247becd2d4272477178e36e9ce890d46939411b889bf11b1
SHA5126d0cabaaafd934bb9fff898ed85db1b345e7c6a4bc48ef5d0e87ba05e4af006752985e6bf14f882990a70b7df2c2aad2d8418c1bc37885548ee49855a7ef2d53
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a