Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 17:55
Static task
static1
Behavioral task
behavioral1
Sample
31628924929322e9f2630d7f47345f73_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
31628924929322e9f2630d7f47345f73_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
31628924929322e9f2630d7f47345f73_JaffaCakes118.html
-
Size
10KB
-
MD5
31628924929322e9f2630d7f47345f73
-
SHA1
fbe43cfa53b668749888c4c7f30af9a4ca26ff95
-
SHA256
1a6e807169ce4654bbed8383d21626166354728d9f6290cf7b1d83e133865e11
-
SHA512
72fc04170ee1173764e5d1b5d0b7fb516d5d4f9e2446e1f4964251ef8bcd1bd28b7443d944bc41184055141c5d93ed356800a7aab9c89abfda08b60a7428e72f
-
SSDEEP
96:uzVs+ux7RQtLLY1k9o84d12ef7CSTUnGT/krIpfLWN9xzhkdZMVeUWN9xy7lVHcD:csz7RQtAYS/6izwAUVVwQPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20eda86733d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426713951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a7d60c9d99cb2abf5ae20a67bac7fc7800d7564d2d24d3a54bef2d17754d7831000000000e80000000020000200000001f69e5453df956eacc57a7a8f244a67f59e1b348d2d0f9b0b2b83fa511908f0020000000e385b41c404266ec2c4fc2b40b904b9b5d0f7b5daa8691aadc5051ac576c71cb400000004785caa5d2ebd2dc656ea1a3e06c5dd281b1a1dfeb53b930d6659ac961d28d0e5d838b8afb91f215bc94b98b37623b0f8987bc0f5e390178bb7903b551e93477 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90F97691-3E26-11EF-84E7-C278C12D1CB0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3060 1984 iexplore.exe 31 PID 1984 wrote to memory of 3060 1984 iexplore.exe 31 PID 1984 wrote to memory of 3060 1984 iexplore.exe 31 PID 1984 wrote to memory of 3060 1984 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31628924929322e9f2630d7f47345f73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e1d00870156a5146ffc02bb22de8b2
SHA17eccff358cb4138c8f21e9c3305dbf1eb7129ac4
SHA256b56c6066b496026de6fe4819dc18dec1d0898eca873491d602ef23440b3ef0fc
SHA51204ee6f8ff99cb17dd6414cdfc6fb19f88c834525a06965063aed844e5d3095940116ebf75afd001604c5faf20906edf57719c7664b29a07dc950399aaf3c1498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678684887900841ebdd1216d1ccf6c3f
SHA199c6703f1bc1aa6dad4acc88b1a7f8e0cc160535
SHA256167084123f7c5aed5844c4c50b4fe1bb5c63d2a14cbad801e636b5ea4a31274f
SHA512db3a152a3874a43636179e1d691f63b237c5c78960753dc897cba8d122ae16957e68d345e6f6d79190a3cc81e48731f19625e6da8418dfc1ffa362dd36890472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ef2e92eac318a8f262b4e2e22cfbc6
SHA1a6380f4c784a13d3467b2a166c376cddcc3fe3fa
SHA256f795252e9c0e3b1a76645eded2b86e41edef87105bbb4bcab473a8c2a33b487a
SHA512b6a70e1935dcad080c09a8dd02ed37546f2b37027623f8564a85aff946eaf1ed3f415d2998eed0d94db9df9d47f63ee532ca7db86535ac890c3a14465e110e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1ac8c8f880a047a32b44eac11f0ea3
SHA198e685fb3bf876bff81f070b837acb79b1bf6051
SHA25669e03b45ddb896db29c2653a65ae585b4b706b6fc93dc0b3b7b1b053b71d85fa
SHA512a108881ff28be6e23cacc53b2e6b48255d011ccb1e2ebb5d3d1434a7c24e9dd0ecde8b7120748b3da28829fc9de27e1121d9f516108beba97e68969ad25bb29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7de0c6767d1992a28b20b7808c4daa0
SHA1c9dc81944d4239f451381258503ff652950bc8b6
SHA256edfe13fb01bc2bbe355baeba43b9a62d620462aba861686874c96d8554994538
SHA51216d6866028978ce6f112df5c1dfb0bd9cb28f9fbe8af84b6c7083db70b352629538b6086905a1b36e654f527fe7bb3bfcf421a9a8b1e1474d0aa351dc422ea70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd00d3fe14dcd2592411b9ca7759caa
SHA1a9d1609b34017b45fd714a67ebbe21d720b835ad
SHA2568eb423c2bc1c1c10a67add371177a4184534f2ba8daaa76494f0147b90490dda
SHA512faf2d5d8a579d21334eb9a771c4ab441242c24db3e904b5aeba0f3dd62a788721368cd01d0bfd8140159d4cf51790373f4109b63ad94ebc0842aaf2d7a888f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f4f0a8f6e5f12829f7082531a0ec0d
SHA1d8088eb7933bb1abf47115e41f6061149219d914
SHA256604edce509a230456a6f319388779fc8d55b362d418b2542a9a5f07f08fe7c44
SHA51264f3e17b4d2f80cc4aaf393337c2769e48f9bef06f24b31d7bdfc6a00192a5480b63b77f9acf0885f54b29ffced7bfbaabfcf1eaf4e9a02a371756f580a4ae4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee1ac402553bf63aed7d2f93001a790
SHA120ee0b9f1351423afdf4e69eff324f71f3763122
SHA256896a64b97e47b745bffe001c48f76ae26b9cf08360008594b04c04184bfe591b
SHA512e89f311836b1b0c24b1e3a865484bbf2cd546053dd169267dc50be5d5190b2aec3acaefc800cf842744a56b1e245adedc570a0fd5ca58ade800d4d873f189002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fd274f4bd5ad14a4e5fbf1163ce5cd
SHA1eb7df5a4dd6022292e2b56a94d06633627e648cf
SHA256e4f2d38df36f8bcfb1c7f8f5f5d8a2488b0079a1820e9070317d842d2f83861c
SHA51270d35f3ad94accc6b82e99ed91880824958301f9655d0dd104420b72a4a8316b8d8a02de017718a1e4277270c1c1c8ad092d64032a87dc9ba4c5272d9e8688ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f318f2f0c7f9009d1b3cc9972248c653
SHA1c964a4134458f4c6ff9724fdd29a64b204139ea4
SHA25632e03999d96f3a1096462aef0c86fff7be5fcf8b415008b7b55fb9bf8056df95
SHA512ca5bb3769472c0dcf3fd7dc3eaa9b0a0794a8eda3f26c219d3490828e5f3e8ace20cb89cdafd9717fddbe60cbf8c0cc2d1b46f80be710230e1bcf4675e6bcbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e5f926ede6a886223d37c3a2b07e88
SHA156e9f00f5a05ce56a995abdf6f5364600c6d42cc
SHA256a8bcd8dc74980895a33b3e66740de9a473a3074a48f5cc1f76c4353f5aab293e
SHA512dae7c6fffb1edc86f6f1c76efcd83754d72462396957880773e7b24590a6e1ece670e0cacf30a50aade813c38ff70ce66ca0ff90bb31536797b645dbca4c8016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558688d04c3e1ddb98626db79754c0e3a
SHA1ca9e6fd13e74d60d257980ae0b504f86bee5c861
SHA2565f5028799c987c08fac30a40071bfd3e933f114327ee08e7b263ee7cc0c9ff62
SHA512d3b7da96546a665efcb009c1cbec83f68e0c91e456754ccad1d3736dd62dfe0d48fbd89514c3a5e6ccb1f136e568d8e317f69772c1e7dfc568cbcbad3da034f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554fcebd8fc23ea21813a2311fee5fa1f
SHA11e82daa92c7278a760b03fd8cc1466dd74089423
SHA256db6f54ff50defac3d2f9a8cbccfd38794a6c42204b209a606c717b9413ab809e
SHA5121634cc0b36b5c3896e036c0df6e5137c399535810f5057b8623a9feda7fd5be241e02dcb6ef6ab33b8985ebe6ee8545a79ff1ea12dafd0a16b8f719b9231c478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52475c2081aa86c9c3f223766c92d222b
SHA1cc4d867b07224e7c67a389765e01440b5a61c479
SHA256428f4920a6c2445da8ca86984b42c3028510cfe8001f1aee898f77e81fc8bfca
SHA512c103af1a69a2b59cb3a9586cbaed656a0f9dcda053f725e2b648573a64a569d41db7c3cf978f4b9fb6c34ca1c4f414ee3e5d9285b99f6820408583485dcd3782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d312b42dc696da21789c58c3d5278142
SHA13ae63330e4e579595508ad0ccf17c62ab13f9063
SHA256206e8f27712b752fab50c05c816aa11b438398acdd147c461da1c90143660885
SHA5120aee18d6b884cc344ccb2ed0498cd76902025b4dc925c048678eb26b6bca54b659ce1c6a481a3503d92f9132f96797b6b2b1e8f9ed2857443ad99e1c29720fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57792ac1c315b687721949e142b63283c
SHA143a39225409a528deef4fd2cb4f41d671e4ae710
SHA25641d8ab2a28427eb5161af1429213ee6e2ddd0553e02b66d07d35b8f0919d3fce
SHA512f52f1249112a38e19e41b66031d771c86985b5e3939ea59d54f248b4d6bbe4f27a88335db9d7d5b0506e76afbc83b59e8dc4b89aa7ca468ccf3e29c686b855b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8417bb87ffa85b6cf2ab59a1b58400f
SHA1983e0bf2bd2504cd92327793fb244b1c40c326a5
SHA256dbd1299312d79da5072077e3e9a9e9c48f5b4306f9980324478550ec4271793c
SHA5122aa5d2b4bde2d41dbf4417b4eac738b2284221592166ecfee74b4ea589798b573588c94f52545e8c7ae7260643f184b32ee815a76010fa0945143ae9d5c7fd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3722ade433117cbdd47bd136b2b2bd
SHA15fc6d58856a30810517dbdcad375531609f7c6e1
SHA25684da7a58a55151c3447c8333121083361172d8a902f3b99ee155cd768b1b2c12
SHA51206dae5c73e6e65c5996efb79408e5a48c649193c650d61b6e46f71d796654e174ba2433a785e67ef2b6abd163fa81875e46d241264227fec7d1414abea458cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e0b1186c3ee9471ece07bc1d0de586
SHA1f5204f54f677584080f413655b4f12cd5d93a442
SHA256f9e2eb043de82d57cb910e681dbbb104d021ab94d53b265541cfad823f0aca70
SHA51213e31a5cb72b87c157faf05ffa3803d6b92b47eb2b265fb54c0b203a5cf01771aa3f44dc6451be648d04cd81ff54fbdc416dbf0c86caf601ea52110acd3111e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522215c1f8dc42732587732c92de65824
SHA1fd392dd4554885450cd0fd0e02b1ede89df1f1f8
SHA256cfc0ca5361de174b5a6d7b986337a9d4f2fae6ac71864f1e133a9d398a265257
SHA51297700db561235b9c5931462dfa02a567af3dc7269703377bbfdf15513adeba90d1c9522717a592425f82e0dfdea1ebfadf102b25b33776d4d13c84b6976a7efd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b