Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
a36c530848ab9eabad67069a4e217a77_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a36c530848ab9eabad67069a4e217a77_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a36c530848ab9eabad67069a4e217a77_JaffaCakes118.html
-
Size
3KB
-
MD5
a36c530848ab9eabad67069a4e217a77
-
SHA1
020439a0cffabfac41f9b691719cf296be1b5283
-
SHA256
dccd372b1d2264a4c3b622185a9496f7c1afd01c58fc4ac18cb4da7ae83e79be
-
SHA512
800f91d6bcb07cf5d37e96f7d72a13c0a773213c0f684d5df88d6731fd1a27d62198c002ef8681a617ce25a4f2f96afa3110d0ac09d86d779924caa82a970237
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000736ac7d963e3648b1ebdcb8da4a0a900000000002000000000010660000000100002000000003cbc2629512d5144e7de57682a916467147d572eca5e5a169fe61f5991f71d0000000000e8000000002000020000000b66d616c10dfbf32738f6088b7439275d20477f1569c562c692ca6f4cad88ad62000000040cb5a224f43a5499f412b4ffbf248275b5724de962869596213132a090b5d28400000007ca9c59ca6b6f44fa9a84898537cfef46bbed7c7838d9af747c0e05da515837b0999cfc70cd12dc262db3187ea9f6091cf7d35c243157b735be538d87b65d1f4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0058e8533bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0CFE771-2926-11EF-9680-DA96D1126947} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424405030" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 iexplore.exe 2836 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a36c530848ab9eabad67069a4e217a77_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5884abbb79bc34c38b6fe07bcb9fbed65
SHA1a3cc131a0d1879713c28d60b39f1e3583b4d787a
SHA2569f367267e5f04ac326ceb95d05dd18647cd8b46f49a60f419d9ecb7530910238
SHA512dc33ee218581fdeea09f265703870125d456dca82bb6373f5b090abf62f40866fd24338f4034845a3dfbaf60585ff509e24d3322ff7ca3dfcdb1b6129a91387c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd922e56512df244694f0a08f01eba0
SHA1fb93d2d137a20ff0744c1f6be128878ed68ef630
SHA2569c5d31bcd0be26fdad43e7bf754b4540cf14adc16e5ddc744f610c04c06a1636
SHA512505febe544dad52c291e47cf44570f0637aed59209825bf2b93a1ddaf70717e512db361ad1bb147910a7268f959a2d3c9f5e6a23e018ccb80305ce746afbc400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c53c0695eab2adc667ff5b4f35dd63
SHA1330acf0a416a2dd6760f435b72e5660a13684f86
SHA2569e784e73a8dda32dd2af3b566bc3526117b207645f331313b3991073e8707d6f
SHA512ee5cb860e37b98e53ce3496d60a4be83bd5e7272e743532e9955f51d8b626c71c465b3032f93d78bbc798de53e563f109139caefc644ef2e1a671f9afab4c39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59920f8489396ace0a36ee1853311917f
SHA1d434cced242e3c646b66118b2ef5e9f7602d1c01
SHA25621d2da8bda9e48c6e2774330d171f87ef73f6285f7583f58430e159a853d2580
SHA512440fb2e69b43b63522a0af5e45b7cadb18e2a131290cd154631bca7ff674cd77e94cedf165bab278791de742ec6c4722fc527a2c4ab0cd7f80f1c96bb884bbb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00989db71648d54667a35eb22e8a72f
SHA187180359f09793a7a2a57574c0af6dcc816cd17f
SHA25637881c59d20e2740a43d40d9f449cc16c1fe5f655bd5fcff16e591a691603e3c
SHA5124a5167d6d8d421e0071512ec2abb65b124bde6321b803d927b4220038d7f21ad8c7b1e93f8a44853c1943aa87189db04c80e919e530c73a7a59bb29be5d361b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ee72161fb9433d8679df7cbea2f02d
SHA1090b59aacce8f1f8d2ddc611423dbaaa6179320f
SHA256e8090597359e3bf7d2a689dd53e392dff81091129b4ec38bd89c166f02cfc374
SHA512c5197947124b6e79964f1c516946ebae1a8b28cfe176611be39dbf92753366c6ecf73a9339893f38a4d3bf9be155ece325d2cd758bc5a2bf91718c97a89dabb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575036ad50af7a1ed28ca4d0364be8c5a
SHA106eb4f8699374f0a806326b1138da2c24dcd4c3f
SHA2567c9a0e5469f485a04956e02ada5d76d5088d051ac4cec3f5840029fb0e3416fa
SHA51211ae112c23ce05f0dc2df4202fb85fc25b3afe53c5b8fa25833938035543fe5badf9389d06edf40d040bcb3fb70a505449855d76708dc4af5088a82063f41dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32b58cc9075aca666ada733a682e4df
SHA1cb88d2b1dad05d304c40380cb866b249be9fde19
SHA25674fc034db80d6048231fd7b3968d2089666b5a6e5fdc9c8620ff84a734808d74
SHA5125cf190e69bafed34887ccebd2dce9b80736233c553e1c8ec6722f92849b63aff821d694d4d1e0a0dc47608be071cdfe8fe66dd3761ac9d45fb10be2c8e5a76da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fcab9e6399cd5570d509711a469a27
SHA13b54bf6bc37952797c4e3efd8b8314ebd2b48db9
SHA256f545cd39ea9e39d153ea10e9a953c53becdc3064dd27516e485dd4542437c57c
SHA512aa0d72b4b58ad68ca61117fbeb69052f57462af8e79869efe2b55c1411672608ff92ae3a6de192592e5d526eadd88ef415102c4a9094bf36fc49b787ab156eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576eefb5b520be671fa8b6290f8872b8
SHA198b9b9e7b7fb5f5499af37a39f7822913afb2189
SHA256a5fe2638a4e146adb29d448bfe7e4531f3c91f8633b42e235e9744e6ef7540b6
SHA5123a653c62c79c178bd17428bd545b490d97d91c12790e30a9cefd3bad64100cae544378f0322b6b599a13ecbe7a6f2a1180f3e0a7f2450d368e793a2de3bccea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348b40ee9966a8489703471919fd344c
SHA16607caf97bc9dfedc2b172663d62c0490999160c
SHA256e8f560c2e27f056cff01bd94fc40f80598f5a539abfe84c45e359d8c8a02c32d
SHA512338fd2cb70c0ee14d7ccfe2ff2996391999e91eff550e85b073279b601c8b39e51e9f53d73d8755d8f20d2a930fa7f089ef7c1814b5e6139efd50e35daaeacc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1da2cfaaa3c4770a2c0679c3179da4
SHA1ae385ce00e4a0cb110251af01da3261574afb6c0
SHA25621da26cbac41fab2961cc920249938ef0d0c38c46cee839739086a5038df5280
SHA5125afed958fa2b736a0c286e6462115649b2c184f6d21f5c85b95d9815f44adc4c89674c2651d0a05f8cb9b0fee9b87fd89854578d08bfe69f05c352d509e3bbec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224b7eb108b3c89faaec321810a16c01
SHA19061a4aa9629534bd6cf7c2d98449f33857be866
SHA256c204e14cfdd2cb6b4bb90f2a20cb544186c9b3b07f7a28d399cc9de4c60b7eb4
SHA512a1e11ed068c0bb32833f4915d5608086029a8a362aeb95b032d20a71db0c2b785d4e5fe626dcbcf5168323a2b67efd8e26165578ca0c4e620e137366d540be85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e841856cde63604015b56be04684f5b2
SHA1d93e4750f29d3602215eb5c33b3375d0113f3dbd
SHA25666092e1888c6ecd05dfd126581298032eaa48e5ea0a8419ef68d9d464ef062cb
SHA512af658d595ea5b948eb6cd5aa2366705f8436a304850fb146c909b48ec47420ad941f8a4b00c5344c47be35b992bd9168bb62633c4d7bb7ada6cbd02652e9f74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eef45342d0ebe1c9dfdea63ffef56d2
SHA1ac980720cc95d99a4a2c81ead16b7358fba816ab
SHA256dde4486d9736ef3ce06cb62e3c1bb583cfb778a16803aa193dcec70138f30fae
SHA51238f06eb7992061d91014938a6413d4d796688031bd6e239b3d4bd16515a6eb55ed2c7541047642078d2668aa582b69d2ef3b917ac9df75f51748a0c4b065ad4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee665369a8b8f7b693e0d3c7402d27d
SHA18d79702208917291389fcada32a9630201775446
SHA2566ce55558840b5cd58e3ceeb1c9473106d15e53eb2680ba22149d07f83b12a504
SHA5122a7798eb58756e1a0a9174be2f2ce919f18ffe79c07370793d1312f96a511b89e4bf04506fd12cf1704c054756a58ec138462b7765606778b95f17da586bc998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545da2d9d53e014891a64739f0af752c2
SHA12a333bdf4d0f3b3a6e92668eafc2ac6118fe0c68
SHA2568205eb51ed51a7d46d8714c55d226bb3d8a7db7e61dd0984ec05a61941abc0d6
SHA51248ce0134ba1faaa001d7119b611cf229e6ec402d6916abdc1609519c778081627dfb708b785dabdc9e15047198409b79c39414880ff6dddddbb212dfd2f7d803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f91cc12e98b3db949d14312652b2d5
SHA1a21bcb1089d1e92675d02373496669d9e205bb4c
SHA256d23245824f4e27cc37ebf4d6880b545980e4de035f16e328b3ee22fec56bf989
SHA5122f3a2003be8426da9b96d40628bf70ecac4d1517947745d5ba28071e2ef65f419ea43201e2f789e1854afd4180060309e2413ed6f4ddfd8a18f22b111a32ab7f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b