Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
38d7d2223ec3260ecf88f7f55023fcad_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
38d7d2223ec3260ecf88f7f55023fcad_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
38d7d2223ec3260ecf88f7f55023fcad_JaffaCakes118.html
-
Size
43KB
-
MD5
38d7d2223ec3260ecf88f7f55023fcad
-
SHA1
226252874b1fdbd50060fb8cf93117f6be4a2d8a
-
SHA256
ed146e32a4254172bab833895a6c32a8dfb074548196ba523a563321006edd83
-
SHA512
30ebadd1dd351dc82440d74844c152935ac6a7d29e0c5779315d087765ef21ed2b10471b34cb2cdc5095b97d33d07dc54d46b43fe29b6633bffed24655411ffe
-
SSDEEP
768:LP+Sq9Uzcl+cnMZP2lDxJW9xb9jEzPYW6b++Tky7Ow61LzrnNGH:LP+1UEnMJkDxJW9xb9e0++Tky7Ow61La
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000004d18dfbebcea075a6b695abc81bb85ed32b0183839839e72cf22b899c74f71e1000000000e800000000200002000000029579084c4e3a041f595c2efd6be7d249e71e72194eea859882078ead8da69f120000000e840a5fe06f0164711c137ae987dd917f420d9ab56134a714777b8283c7fab13400000004a491feaeb1f6e8c2985776ca6e58b7230cd6e6007735c2eb913c9dccce60c2aed5953635558c581a2c9c8c61cea231dc8cf7043339372ac11c701f3b82a3513 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61E5AF31-102D-11EF-BE4D-CE57F181EBEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421659125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507f1a383aa4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1752 2036 iexplore.exe 28 PID 2036 wrote to memory of 1752 2036 iexplore.exe 28 PID 2036 wrote to memory of 1752 2036 iexplore.exe 28 PID 2036 wrote to memory of 1752 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38d7d2223ec3260ecf88f7f55023fcad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c1c2e64042821f0359e25820b2f7fc0
SHA1c4007933f42b8713bb8671052e8d79f84c5a269a
SHA256f28326756acfe903ae63bec89d5c6000d59f5ad8fbc3e8817022c6d599f99433
SHA512426caa0765cfc3dccb40a0ac75c19b189cdc6eba128a6ded8ccdc98a45774ef829e9b0967305010fe3df69964494fe34c45c1679f1e6cb29f15c0acba4366b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5074e7d87e740e80bf35955712781c0de
SHA17e3c3121a4bfd98b744a6fe92818f42f13979944
SHA25609b8e41bb80567202264065598494a288169800830d1cb9eaf75e24ce118471a
SHA512e64f828e023481a2cfdbccedbcadb2cea68b9a43f9deff41230bb8fd7fdc7432587fd9ecedc47dbc80682d6cf7a823dc94402e7964d9b45334e960a3d21a4ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52483fc3119ecf0e5d7fc7f7a3dd1060c
SHA1c291c05de09b9421fc9b088de967c81402a1d43c
SHA25613246e3d52bed0d94e130ed599efe9a8f9709629d6be43cbee775783dc6ea07f
SHA5123b0e4763ccb873c64500aae94389b829ca18981ba17ceea99ae6aac380279d6484a8e9543da4e1e7a0b5fe3616805669671ffc49882a8d7d4da80806668e10cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590633d9534e72dcc443c9380975b43fa
SHA17976c6f5c35d92306ba5e68437909a94f91bab65
SHA256b2d049aff15856b24000fd4728bb8139492cab90ca54aa86e4756e1f772a4fc4
SHA512c32bcaa79f48cb95c1cd7c38688c367b7268a4cef1c514ed90c474ea3c14826e815a75b0439ae39d9df697b8927936d366561d4419b409dc8193589b61ae1c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b7ca1cd364cd6a78c6df40e4da97c1
SHA12f9b796780be2df5f1a2a60bf477422756af137c
SHA25666d3e97ad5fda0c8e86756a38c436144646c205b81d7d060e0180f011b3b64ea
SHA512fb80985bece147ce0159df89c945ace2819d2f2ed1c6c548b6c4daa095039e1c05c005224cc84582429f4c9ff0925c86d049897d6744215f52b349b6d37bee04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c19e0afa0fdbe54f67515e3b5b2f0907
SHA16224bfe78ab8b804b8bf2eb03bc0f62ba17f93d3
SHA2564cd4342bd080d3292aaf5e0547728d6b1e3c7600f0d277497293d2722903ccbe
SHA512d8fadf00ae0192b61fcd43f6a5c6337d436c9a646b5692edb713009fd5e11a3fe0f14ef107b8eadf233ef96945b50b8e313a4102a1ed14d2593530d750538894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55434e14645837e7f27802f5603f81d92
SHA1059673bce954dc9fe62ef4f3c3a01f6f7c555bb2
SHA2561822844405f8570f2a40074b4df0a9f821efda954d927446436094903db18cce
SHA512ac54dbae6e5e8a2a00627653ef9e06ec6130df08dc3a72cef5e95e6611153445748cd001aff8c6dc4894304a8d6ea212d420f7a568c8f43be3e4f02aabd5d41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5479beb0f69b3e39be58ad84291363609
SHA1556dc6da3b18f591886fa9fa2cd867e6b7a6bb63
SHA2566659b48c32642c065ae863305dc04c0b468e4141146bfa446cda4f3f3c6b1f28
SHA512d915e9e132fa164ea11be058f3ff3772bbbe28c3177a9ae9fe529c6285e6197ecfc04061d354a239cc794c6d2c4e3203d43a261a4981097e9b4285de38683373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5157c3f65e634d4df28ed15a64262711f
SHA1e832455bd073c102c87fc6009593c2b4de2e4377
SHA256779ab7bcb18f480370503354659ce6a77ba6b27a8b44142f092f9a1ac8aff9a5
SHA512f3bd3440e0c5c6a1ca775ea830366d34ce98918a246e93ef38c17309894e1a5e930c1e6d737676e9d0f22518c26f5bc5ebb9b6786476d794543fe9be983f8b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e70b1f4fe65fb80d108b2668d34b2d86
SHA14dd9f1f9e198485b2134a42f5216cd3684ff3845
SHA2562dea60a95b41046bdf9bb547d15e40cb564ce75e68c7ce8366e83f2a99f08822
SHA512ceebffdaadc9b4ba4131a0398e2de1d4db208f2cf41d508b2c93b90db3c8380f4e76e8f45ca8a7aaedc141b8eddf9ad981cfbed89680517257ec3d7333c88046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522aaf0aece1e95ae5ec32812c619d394
SHA11f615cce0bbc6ef537d3dca59b93c571d0c61913
SHA256ab98d9f238b1cef4a1adf038745d1b92b059f0642aedf92a58574d4626465a28
SHA5126fc52ba499619dd0b5a5dd8ae009259daeaf12bb43aee4e43bbf3ba0860dd6993de3339c9007d8bbb33b749fae48c4474c6367ed8cff1407411df5d577336bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ace14fe85b382ec4c99b0047c7632c
SHA13e3937cc8f0c674355ccb47685c7d879accd053e
SHA2569e6a9b13e2dd0fcab344213d5c5458c103983a07658e3a77b36d65974cf2f284
SHA512127cad5fd25e7dd85400da3f083248514c9eee73a644f1b328655c5d1f7e2a99ce3cbc6900e798320bc8283b3cc0451c9ab3368ed93007ddfec745bd09ded3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e81308d358b058c45ce8a5871cab15e
SHA1b0e712f85b90213f0755e5957c05fd7a70c85e37
SHA256096ed4bb6bb55caa9597d09f1c7d3ccc652f22a6df26977c9cc2883e1afdb6bc
SHA512824c66ffd82308e466b30410ca61da2db74a993a84ac7a61db93dd538fcccd00fb1efac349498014c0bcfde033ba346200d6839cdbdfe256393c60e70d008126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea75722eeddb381b18c0eaffd83afb2d
SHA16cc13ca84d3c5dd436f51d8ec951a98850cf5e9c
SHA2568166edcfaead9979d83edf2dd51b01710e080a4fabb0f5df73671f8c6c50e7e5
SHA512f1bade8d01a931d6ec13370c3a19eaec896458b61db5c4446fce4021c179acd2a27e46a1deb986cf200a7d559b316882928759c93800ebbf3acc3b58aa565baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c538a44a3673efc045792fa3bf8f59f
SHA19b519fcfbf48071b9556267c5934ba108cd7bc7c
SHA2568f02bbf86137ee2d14717277002cec425b6fa596f4e0466886ddff23e769c55e
SHA51283794dcd7d1520a1f111fa58ea33ba5c06323e829a4682153dac163ed64525c487b595498fb17d9c980deb2082f02c77b1cb54887f2ec1fdff490150c6e861cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581f9ea697f40750b082e5be75b0b7fa6
SHA1f2aef33eabac66f861e901a542f6c86fe2162a74
SHA256f5cde676cb0aa89927046f51101adbff7c509b5eba5316791569bd6c6566e3bd
SHA512d5664f03b74a53dd17a50380882937e7705b0ca4977f7ed1f0101ffac73279dd394c735d942d8bd30fac2d916134e440b9722b07e4f06c0d1770800b7c846c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55298a69fd76c72b6bdfe6460693b5b88
SHA194b51f3bc0745ce4dd73486d6d69404f3c301be4
SHA25632a8a0a113978cd9ab3004973db6ced1ffa5ca0b54a000fea17f46820cd70af6
SHA5126ac54e1310ed0ae05bc781b472a9fc65ebee2d66a9bb296e0643142bbf751eb76964ad6552b504337a9cd6b9a92b933bd5fb433cf2cde79802481d6373cc71cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2d6ffe229061ae24f9196b667b2db84
SHA10aac064fa29abe6c40edd8cca78459b4de7b4cd7
SHA256e56f3480c02924ea258e9fbd790ace22fce5daaf85956fda851daf521fa231f8
SHA512dfe23525dec3b5c4fd45583163ff6de781d911726e185237379b2e9068c67af3ee6f0c035ea21227db31c2ef1f22af9e118762e6a5cac13d8e14a1ca781511af
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a