Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
31091f3bf7d682111514e53d2c162ce7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
31091f3bf7d682111514e53d2c162ce7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
31091f3bf7d682111514e53d2c162ce7_JaffaCakes118.html
-
Size
57KB
-
MD5
31091f3bf7d682111514e53d2c162ce7
-
SHA1
c08f39896084dd5f0f0b5b6eed75b7a51151bbb1
-
SHA256
d95cc339624859ffc1ee8ecc8b6b1161668bf3028c02ba27fe34f00dab508ca7
-
SHA512
dc6342de4a42b48869c6244ebd75032e641bfe72de9df79da7334edf8b568df21614b08435ac07a0f9778eea8b9261f5d7547b7f4a8d147e6290022b567b64e5
-
SSDEEP
1536:gQZBCCOdE0IxCwhB54pXXde1eZ2Tpvrinq3oxwLnoCLuEzLk/cnGKWyFjhO+pBMH:gk260IxJ54pXXde1eZ2Tpvrinq3oxwLU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a067182822d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426706542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50E58871-3E15-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005134b294e455ad4fe72986953386c8cadf783c006b9f6f36679ff43bc34e9a3c000000000e8000000002000020000000caa08e3b5abec05fcc82dfc9a64f2ffaab7ac7cf67ea5f6d70f00619ea366c822000000044ce7308b2e8b7056c2266e625ca2228765246374d58788db85612c431cb2768400000006abba5bf3f7841a3669572abe1c66985a64d790efaef6a8a5387925963990cea768cc1d5a780fefa4a80837cc59da89a02584131776d7bf94dded166c7b7cb4b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1748 2192 iexplore.exe 30 PID 2192 wrote to memory of 1748 2192 iexplore.exe 30 PID 2192 wrote to memory of 1748 2192 iexplore.exe 30 PID 2192 wrote to memory of 1748 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31091f3bf7d682111514e53d2c162ce7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604d884e1f39ee5b56427926bd4661fb
SHA1615fc83229248b772886def907a9edf1155d9f95
SHA2567ca42161505b066961e7c57aa4483fc284e8de1124ab7a6a717a72a79ee12d90
SHA5120c67e95256a100c6aaeebb40c19931174a9bafc7a131e72d73308f3f0e1705b07d66ab2c147ac6c3d2d5398035ef54881510f3ce093032ebbb1385502ebdd304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f03b353eb049f30d38306363e010a8
SHA10fb9d58e20f3ef6e9079a37d6791a2167e3a84e9
SHA256a55ef48f1465e422d570de32e1920eb17e6e1f2d40601a7228b40fc776dfa003
SHA512229f77e00a2a3dc1f9a8194f009b8fc020fc2d4ed0eb06c8c6af57b27151cfb2fb3c9236e0ee1a1217128bdf1f0719da85ca78d09f547444f3ba6fde75ea4ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e95eb2bf6fc6659efc1dabcbc90b46ff
SHA1681ad11b8858c4b05a9e5e79132017f4f71b44a1
SHA256688c6fd2c78483e8ca5bfeb299f1699495731cd6f8a08016940f37024d8da4e9
SHA512a3dd249820f39c2cafecfb78cf047494fea388c711ac47dfdd24af57e579a070a9e18c80fd61f6ba84d9ba828fa5ebcac31038ca7c3a35cf786372458ea18fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823b0870f865e2caf55950f8fa2f2394
SHA139e59b8ea2d3896e080caec3813a2bd1c534858e
SHA256ead6110db343e84a7eb33a59e256203a7466ef8f746f99ffab4401e34d21572f
SHA512b9730fd0209767667e706cc52a850044fb178983910f47b662274e9337208b38bc8c315a7ad0b358ed1d214a5c33b8dd97de405481d8363e4d4d89cbc56e5306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96d27702fa23cdfdd132205f3a818b6
SHA18a5c3169ee18cdf633077b788e93f484c9434cf5
SHA256d57ac57042fbb7d92c33117e67dcb26c5746019d5830a54d1d19193194db371d
SHA512d49f6d7b32df4d93cc6905c11a37a032eeea276913f364dc3b6c3da8788a2ebe5588f57c7cf4298b9f69e98a031c1d6c8b08ec08857fed3f8e2361a937016887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5506fa2c6d5ececad7644a65c5e499178
SHA1e0913598e70b167162bbbc8a927cbbc9a5884665
SHA256148991ab70a67c97f90e17d2946629b476d6d450ad47bc28978edce780facbab
SHA5127b18ccc61ef665fbe31f55dfc11a13ace5c6e3bb3bff7ab89f552393d8e101419d61d93546030c3627b68dd629ddd98c644aafd41a6975e95c01c55506438d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51142d9de8494eb57624ca36806ae3d98
SHA1f395a9f571c983bc572441b32ed1708481e2c27c
SHA256bae2c400919ea77f654603af1d33ab77a5507e3fbae7486569abc91cc3ec26e1
SHA5124fc6a3250bbbbf7e908561ef9aaefa48d34a710bb81af36d4e843e18f19737b85a85710f96a90f5428a0c793491fe859c18560bee7bf3429257f55df94a06f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3c8056dd312cf445a7f23abfffe936
SHA1e2ed2b235bd4fd62227e9cb9e170ebaddca127ab
SHA256f527aaffd4481427a759ec4497c4b72b3c6a4750fc09ed33a84a80f0026a8f68
SHA5123bb44c48f0785dbbfd5f16d5b51b8cc3d94ca2432784b72e677fa43d6b08dfefcc9eef3d559259ed733ed810624dcb0bbb6645a11740ffe3b97a47d81827f50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c715068b4b3c2a49c45b4082f7db00
SHA1e50deb00460310fcb49c820967e7017cb001fc55
SHA256050806e5df5dc10b2e7933e3f97a1a538fadda6ad346321a6f9d3b66d237472a
SHA512ddaed14b2127a1bc86ad7dab2296e9e669f9bc69b9318f9706a532614208f42ff4dc3455638eb3fec2dd5c6055bb628a963beaf9efd63db68c7a268334f2e1bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322e5506c3280d0a63d1360907106bb3
SHA1e88251a503d3130af1f05dc7c65d9ef00f549aba
SHA256ac6098bda92bd73d52a607c0ac2663e312a06e90eaecffa261a5f49d59bcda4c
SHA512326b8590b205988b842d643aea4529dbe30c5b46cf78162ef3826d4fbe5a8e615e6c4517d257bd7b6ec922a22496098f03757a073d940a30e5d539c8f7481acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b46c8551b69aeb50e0bdb9eac90963f
SHA1dd01b593bb956c66af87fcea51c4d6e499f95a5d
SHA256d3fa5baedcedf55684b026eb9ea814411df7f0634d450041e03b7ca434136374
SHA5121092394df4d105ed2a81e4580cc67fb7ad8558b295fe3a30a55bf5a0d0087286a957615a3866e870a2b53ea1c4270e394bb9d71678df1d003eb1c1fc45a4dcf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573080c61f5331682741a0fe6ae0c963a
SHA11c952a3ced2d7b6f7eb77ee4c0800d63aaf37d3c
SHA2566ea7ab2f0a686a51c562210ff12b801d19cf6a5c3e2213a4dc5c0b5429481cf2
SHA5123f5758e9ea312189a4ea16c2bb6daced959e7b385714105a31a5cc6e8db31956749641e0f36e82e9f10073007096f8b6e5dea4018fbfc1070b890620c840a0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190f62cfba9855544a2a4a86fbe5a36a
SHA1cab8f331a6fccfca51e3ac85964818b5a6eecd6c
SHA2568eb87d832ef3c8dbe711d34193d67d989be80fd50328170e56c894bcccaf5b4d
SHA5120eb18031c9037c950d01aa677e58a2765d19ed1be0e3f16913d193c466ad09c6d823c13ae4b1c1166ec3e9af7cf80ff39f42e254f80e26862b0e576e4654bf0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1bba2f2a5601b9788757d6d74f72a8
SHA148da559c839de2f561276840cee778551a3feb65
SHA2561cec19c1200440392fa5e15f592642fc54d243d7cc0d38be040a2e44058976f1
SHA512dcdf5135f8a6921a567686053f84f24a4bc6d581c6ac33cb1e94953fb926b66149731fe579ed5c55c5eb0b658d428568023c4c6e94d42ffbfc398ce547c3acb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d26af08b59e8b5c8c56a295966aa7c18
SHA16b6cb5a155f15a424de77c06fcaa5d21bc046c2d
SHA2562ed2255772d02b7c4296ec2165224bfa7b0edd8c519d7413b0fa986f1daee87e
SHA512a7207664d5be4bb5751f1071b771ba35f73df611e3a59d205fb75a3e19d0ce0a981da44d897ef7ba2ef29aed7e0215e2ae2dd8d9757a8284cca8de9d44a14c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57533851d336699f6fc41fb79b2a78e5c
SHA1047e3ddd4e7514de6c612b04c0c5be7e9ea0e62d
SHA256e0c1b66eb8cfda59bd06f9c8b34b4adf9a86c47e3e6e88e4d4d931746f372cfc
SHA5122ba6fcaba06581d45bdc42a95a7ac76965cbecab7a4064727bcaaec44dad3f030a45707840c39b72e2527b8aa8ec3ff9fba447e66d30657e9bcf901fe5e9c219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb28b50e5ec4315a4adc296d60097a43
SHA19d639f0b1ef3f1b30d7e72febea801f62da483d3
SHA2568fcaf1cab4e41af9a77b3c2eab848728718c41ccc5deb4a5df74dffd0ffadbeb
SHA5127c40226866e2afd0e5fac1ab560b56fbfdc81fede475dbdd1872de7868401d0d4ae29313c7918c7e760d84a550bfb312d7255bf6c8d653508f92b7b6fa16f8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573363a5bcc8bedb5895a37489e2e3ec1
SHA187a2aded085a9debc22e64221378733a6eb01e05
SHA256df9aa181bdecd08e78877d294086fe4c41ce65bb6ed88596a8e4a6dbca81aa57
SHA512c0a1991f914a656f80e0310743806ac5e945a78a59feaee2cdeec46ad5f018a8120a8818cfdb358cf3159db469208809d0ab32b49fc7519a6db52fef6d63ea8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f653e4c24b3d6fa4072a7803c35ea4
SHA146a20617b55f461e81ccb74a86ab25003e89dc12
SHA25683b00f0b8a821ad4ff0f8f66293a4e4750b51657348876e0b90918a512c3e8d2
SHA5121aeea0821e44433564ca6d3e0a03b6711b3f083492b095cc53c556a95a43b74a39d73f78c757581c41d2f157ffe4f90ddeba983237ab66964fa0ac9ebe3cf182
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b