Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
31030224a8cef73788eb01faa103be6f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
31030224a8cef73788eb01faa103be6f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
31030224a8cef73788eb01faa103be6f_JaffaCakes118.html
-
Size
250KB
-
MD5
31030224a8cef73788eb01faa103be6f
-
SHA1
b56296f10262d1344aa9d67011d3e82a9332451e
-
SHA256
9d9de4d89fb406482305318e2cad09436c9232619db37f3d0812f0c178f64a49
-
SHA512
4578f48099e0387c64bd561a866378dc288708dc7ec8b2e272cabc7111055b1381b0579e6f814e10206973a3b709d14e2314d3ca74f81d9784829b6936f99350
-
SSDEEP
6144:Gq5NB22WnGlQqnZbAxVrlrQuyT5nZLrlKg3Ybyu/vRerXNL:pNB22WnGlQqnZbAxVrlrQuyT5nZLrlKM
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426705907" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e89faf20d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D653B6F1-3E13-11EF-9143-F235D470040A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b0000000002000000000010660000000100002000000019460c2a9811e297db42836be289b42c6e4fb59e9107a8ec03ec4073f8c3862a000000000e8000000002000020000000d3e077ca61f5433130e01b350b8329f7e8798b8462474366422095b085912fa920000000b95265d34b8fe3e621eb6c184b65ea2cc03f7ab1d5ca340377ee88c511370945400000001ecc23f662d0b19d05d43d1e7468208edd222e7112dbaa7a1ec23dcaf8887b3e9e5156670d307a45ac685e43d4b005b03dc8fe698df0d7d79904f641a623dd2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2208 2084 iexplore.exe 30 PID 2084 wrote to memory of 2208 2084 iexplore.exe 30 PID 2084 wrote to memory of 2208 2084 iexplore.exe 30 PID 2084 wrote to memory of 2208 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31030224a8cef73788eb01faa103be6f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910408a9f9ab853a8911f46c986354e4
SHA1830588b3df1be2576361fbabfe6e78b09365a6bb
SHA256a5fa827cc682d48a3b3743679d08553c92ba62618a57af003c91c64c2dc4ea2f
SHA512b512382693dc8df584bc559c22d2980ac2f149f02d4eadf77271079f8cf7c041c97d39580a30fcd9d3048076a142ae46ee483240949842f8fba59b0478b004bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2decf5618c572b9398bda26b2885b6
SHA17071b9590209c8b96c8b42777c40492869a06e92
SHA256f95d0ad0ae420badde15a44082c43799442d56b977186f6a7e30d6dbceb44970
SHA512f3aeb13d4f54d6da8b596f36baaab87d0e4a2d4da571587b3793e29a9812a3694d09648750c4a57ea99519de983e966cdf9c7df05b6deda18f7ab51882c19c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c5e1d501c0f01e2197303e06d4eeb7
SHA15bf03df42d00c9cce93d09507bcabde2ab7555b7
SHA2565c2b60d860e7bc094fa1e991df6d6df691845fadfebc4acba06cacd41b71f1b8
SHA512ccd15e19e2fafc0200cafb2bf7b96d61943120d6cbd8e549f31ebd43228291b72e915fb57f5caec9fc6a81372373d3ccdc4147c61f3efc4cdfe5cd979ac621cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4ea09f74b22a178d7c2e74171f1f8e
SHA13cb44e25c2d1287ac3fa45eed01bb1bf1197ba75
SHA25667abec9fc0058590492edb927300f2827435a1acf3936cab9ec325a64e607199
SHA512446b8f3ccf7a99ac943804652ccd78408744ef85471efb21bd6b078eb4ddb16b54cc5a51e2ed51b5cdce02f55914e8b63147d02dab0e062393c5ce275c5a7891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2af4843388ad91dfaf61819e3c40b7
SHA194cd1453c2fba60127443e1a4e362d076efc968e
SHA2567c961e8de8bb5506dee3784afeef727ce0b9c9dbeb45341676a789e020a6143e
SHA512e3085b5288c5ae81f41629e7bf0bf25ae8532a665d5b5e44b97b3a700917b75ae7b26cd4b31026e4f3cfb255d3d3e8d1315263b48e2a490fbb0f21a40b13604c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc58310dc0b183362b3fde2ebe1a332
SHA18fd19c87853c2b9ea5040e0a381aed3ba698a6a3
SHA25623e0fd33b08b3d802bb114b2e09885fcbbc80a1defaf72647b39ca1677c9441c
SHA512bfaf5ef945b0961cef90f6e79e01fc842e5a03cbc0267d9fcc3f4a5ab361f0e6b43cd37c7fbbb3a9377857ad93460d47409fa9bf1614720fbb11a304a8b154c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c507ef98342ced5cc5f4df9a63e91c
SHA19e754da13ae19a0e1819a4b535e1a13f8d6cf07a
SHA25602153eb8dd082bad589b601245340a5b94ccc4749ffd886963c641135ce9e5c4
SHA512cadd56864901c4a00502f4cd743cc084cef8fbd2dc1b6bfaec4212087a48104afd58a4f836debf9a2b9fcda1c99384a5238b707f1a4c125beb049768b1cee0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dbd71fb74aaadf1a2bac0b8ba08e04c
SHA1142c62479f7827e89ebf3e911886e5f207277861
SHA256c62d255b4b67a5ae26117afd8df3cd0948816d06bbe1153773c8b5c546a6240b
SHA512f55fef62d22cbdb7966817ecf57115494fe6fcca03211798ce94109473d7291aa67140f43bfb22dfedfe4d2e83869ee1b4d360972a15970cb6a6f6fed5efd50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58190641db4b9c7a8ad3628bb03423b60
SHA10209c3b84040f21e9e6c9b4da442335c6c10b7ec
SHA2561589009f9fc51aa87c09904b14f3992435cfd7e4a83fce40ebbacee8b96ef57c
SHA512e5c2203ba75c195ebd04ab005efb69c4353fb22eefc82e108ff7d6dd3a8d3291fdac30783c298be6dc3d115c0f0f6c084c61e14216647cfaba9b9280a014d01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560105c8fec105a7f21ec29cf05310dbd
SHA1f7416bb896a97061fe33713daf8a33bea31a617f
SHA256c2fbd84949d8b822c82ce5167b9a37ad8ef4675c25f29a5b93eec47b6eb890d3
SHA512ab96317a293c8db87802ed217b6e339a2bf5db53e218e48b705bcc1feaa06d2e53931fa916ca4ec09336119086f41fdc252e456959eac9bed02f6f9a3fa342b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec1653989b91ba946828fdf01050e2f
SHA1864045182e965f14764b8ec5aaed85fc34280bc8
SHA256117ee9da2f5a0b1edc7b2884323a648fc53358e184b0e4f1845e5521045ee489
SHA512ea861d4e865db6cd46f8394ef7b7101e9837bfb8c259f340f08194377da9d3e64bfad65eba702815bf932e44b26bb8acb9f129616b77f8c59f4a6d3b9b9b304c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0f10bce177d37bd4e9855fbf792fc9
SHA10ddc6c936f1b9984c89fceaebda38a208b4e604d
SHA256dd18c0f3c3002e38801eb2f338941895f1c532a68a6e0f31d84075a9751ef81d
SHA5125618db1d3238cf12e915cfacd6c3bdda7724052c44b02ecb6526fb8bb5aa347beb9c3ed9712b4247444a6792aed4d83a78babdd69e9ca4dcb27bc7138c12ec6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a434a7b109ed57677825030c080b83
SHA145aa5fe52a1d884941166bf1cc04433f81392be7
SHA25642e693492901f9bfdf6ab140d08b0c8edf557a5b4db35664358d68934aae7a86
SHA512f4991ff82bbf5c8dd515aaa9540c4b2cbbb0741e8f002895ad999b3857a63ad38b0ec64685882fbc46347f2a3f28098dbeeb9575956e8a284e28e51b2cc585e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e6301158022b0f5db607ebcebbc289
SHA10a1beebf5c7c9343a1558259a08885b9fe985cd8
SHA25664a16e7187fd97ce33e6036269bf4c765aff607905698bb9eeb2a233047e343d
SHA5121513a08488cd15085d5ebce2cb6c164797644af98af78c4a0146cb17e5c2120032232f74b55bcc1d36f6d6cce8a38d257f3060b064fd673892e39ea43d8e6bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f441043d5e8324da687464ed94961c9a
SHA1259fa6ffb0c4cc56ef6f56f1f51e29f4d6ccb6bb
SHA256772283b348ec2e4b627f04be3013f3d81bb049d7d66d2081e524c429126d2732
SHA5120cbdbcfacc30c62ebf4b3c1164f78c33ea5c0fecb8dc6994c278a59e895cf207c70f9879a07ba2c25e3cf406e724bd04f925cc2cbd685831623aa69c25c5c2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50854ce89c3b40e264d35dd349d76a513
SHA101762e5e257ccde207f3995546f5e3a9a7c68f7c
SHA256f8855a02bcd2850d5f217b3f3e0300c9e5ce33a150eda2b25823dfb17d1e2db7
SHA512f993833f89955f123fc51ca0507fe691adc76d69f176f51f99e031600709f0972a4ebd856afd519c6ee6f557f853aa5baf86cb7f874b8a42265215b2561e5905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62089463f965df0e84baa2d0dcf08c5
SHA128f5f6f4200bfd9a66c88a630d12a98c8a1af09c
SHA25685c36e8659f334ddeff4a1c4301f6bd6a4c3f27eb8b817fab13cc406b47823df
SHA512ba32a5a83ecee597cd01ecb77a40be072c9fc2ae1e357139128b423e36c156e27d08ae463bffb72bccb27d10feff1eb5f491cbe06494162b1a5777530a01e41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e46c745cb8d886af43f9d5120dc40a4
SHA189d049ea17e2f671b820994097afed4758ecf8c5
SHA256bd909492035b0e358620c1c579cdc29336edd94b6d42bb6aea8286334b015ee6
SHA51274b34daa416e008b140590765c8dce0d5663d957a508432c42939a29e73bced30bc7aabeda6b29543e3bc5e931834f80046b1101a342c31ce775329499eb8f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d10be6a3df53b1449f03a9148d7fb18
SHA10227b87eb57bf89589af4d68a6bcfecdde672b99
SHA25620b9c2ab1679cc87f187ae36907b9d0792cb8a5a05823fc88a63977e6217e055
SHA51209ecf48eae1672b42e1a57cff6bf7e183425ca5ea109ecbcb918a498a9dcead8f92b58984b560b1ad453df5cee69e957db9e5a4bcd986399b4f70478c7ea0395
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NIUC9X25\f[1].txt
Filesize40KB
MD5ada234ad7df0341ed740d65bf93f4825
SHA1f4019e031cee26c535ae967c75e76a9303d396c2
SHA25689bf92c5f35b509f94ee447ec4c904a2004b75798c859a5ed2d8eb5b5d532a05
SHA512d3611218cdaede1351ae41b4e425efb9f1416381bf40995313fcc61831ed97225385515a654ace6951ff6fb89956da0809faac2547e78ae333a29e0c30f62c5d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b