Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
36974e1c0334c4c85613880690ff7034_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36974e1c0334c4c85613880690ff7034_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
36974e1c0334c4c85613880690ff7034_JaffaCakes118.html
-
Size
11KB
-
MD5
36974e1c0334c4c85613880690ff7034
-
SHA1
c514913300f49f9c30b0ba248f7dd9c4713f15f3
-
SHA256
2e9e88d206b219cab1eee66cf42e7d1ae76a389b6efbd5d6f4715813633d100c
-
SHA512
edf32935ba8b2b50bbb88cb66dde5a4838d14c8d42cd58fab4e6a42d2c2f82b21a173ee58cc07ae1f78e0bd4abdfe017619322bf2a0570d661741015842579c4
-
SSDEEP
192:2Vs5lIsr03+cz+cw8k/w1wvqy+c+B+cW+cKrn+c7+cu+cU+cn+cw018LOXuBuLbt:sYlIcuJC/gcIBEsrn9IuVC08LOXguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A77A171-3F09-11EF-8334-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e6da1c16d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426811248" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000fdf0d0283c032479d2525289ee686d75cb87970e5e8be5166080afd6122a4db5000000000e80000000020000200000008e43c974a837f230b498274f55d497886881131f7b706208c6ecd9f64e4bfae4200000005b29b12598a2d410affd834deb5c25e366d624c7d4f3c29dcbf1a33fe930568a400000001b7c421e4b713e5923da4c67aeb3d9ff51ff8bb41919b50674a662e6763d3ffc2dd3da1bff02af60970879d0ea639734bb6f00fe08c242fefae230922b2bd0c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 348 IEXPLORE.EXE 348 IEXPLORE.EXE 348 IEXPLORE.EXE 348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 348 2984 iexplore.exe 30 PID 2984 wrote to memory of 348 2984 iexplore.exe 30 PID 2984 wrote to memory of 348 2984 iexplore.exe 30 PID 2984 wrote to memory of 348 2984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36974e1c0334c4c85613880690ff7034_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974d30f25225e0d5e085d1cc9f7649dc
SHA18d53812134dd523e5e0ef776f1c0052e0e7ecf8e
SHA2562f6fd5b4862cae3fe6315f0028adfaa7eddbd34ef9464d5e8e0b5cd7b594e612
SHA51256fb46038368337f19cf88fa938325d246521a9e4b5b2237d615d5a38e607f1054f97f53da28fee1b2c62e5646022410caa070c00e2e38a7d833747b7c55ddb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b70278d7e6e1ce7e12c0b4e1e3d687
SHA1409dffd5e8304270bb0afa9953d9b000468e10d3
SHA256f9695f9a3491005e68df5c6a46dc4a36e9dd1bda916330def237fe44e196f68b
SHA5128c09dfc9b774ca153da0057594a9ea3b316d8681e31c984911bf92e66c65a67158360c49c6dc442bf69394ef236831492cc6a73369a1f9055a5e24c22ca8ecb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e81779898f9d097ebbab47915e2c622
SHA1d8cde744ae8688c18409d8fcea9a7ae03be92fa1
SHA256707c254bfde22543ff23ab9eb4315c825ec6000c64c31190a2be530ec7a4bffa
SHA512ec487c97755c36f8850d5e40c02b82d09e5c7471e5e53d1e602cc16184b8b2206dbc196f741ca7cda219e7f397ed4815b9ed8a898686c7c02daf7ff7406c2df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506086beb93df86577a18fc53739e22f3
SHA1916c1f1e1ccc8ac8a1654e4e786ffb0d8e9c3539
SHA25692718a5eaf02c10e623afc59f6ef289da254741c9573ff75f28699df35ddcaa0
SHA512c7e94f247eba7c48e5d96da24ac741c571f9fffb2087d04e831e23e5516f53590c2eca4edc4ef99445a54fcf768705ca0520361eb08e14d6828295b818b0d464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c8db8a8099a335a772adc0930a94b16
SHA103429e38e197a00f83340701ee28d6e53a4974d2
SHA2560d0984bd039ef7e2483f6b988b7bb1e28205befe8fb807ddfec6f9ed7ece1838
SHA5121adcc2a477c1390a75f29e07fc40f8b659c3ab45de2a1eed8fa5401ce19f4822d31fb57bcdecf30266457f1f441d3dabbedbe7d5f958fb4c4f0423b42ba3e3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dff57841895b260a112f8ea3776c0fc
SHA10b50dbce642bc54604a01e0e21eb1356c89eca32
SHA25679cdef48157b306927907939a5789912802d6f165cf798079340f615fa7ab666
SHA512ed836f5cfee20467dea3f84870de0849a344b56424dc8a701df19e8ac368bc95a80a65f85fd8e11ae0fe6194058103e56d20757b394b531b6d6ed82e2a682a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1da1d490a85d2663d3b5af8f03f1aa
SHA1649b250ef6a397055dff9b79c8be14eefdb8440c
SHA2563b95ef841bb6a263e0b6d896830b78d4475ffd52c5ef9f5f68cc44b7fbdcced3
SHA512a54fe142ccfe02a3bc25de32686ac53b1810a6eb9d0593cc2337d8af5ae668f6a348aab48b6f90584c3586825b2b8c43d4c77dcb008d456f421512c1f7687d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ffe2f79ccf5d13b428d4f1a0dcbc34
SHA1f2bcec53293cd96b6dddff3276132bbab9baab8d
SHA25650a0895ca00ec1e86e454e9919adb3d10d8e644987978625367565bbde1ee38c
SHA512f2723d0618985b68c28b491080fcba46668d657d94da607f1dfba0aa3e79b2aa8ac9cf57026a4dda219afb022c8e1dd9dc76541eeb8d68a6681716844609a031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dfdc0c2bcee3ff8081f5c48de71ebaa
SHA19206362208a5a3ce59dd69823488380a8ccc2174
SHA256188a76edb883cec173951769fd94c848bb3c9eacf0e9d7a3f02d255490713bce
SHA512ecd576ce6a84690b3fa857259d4e512afd68285ba9a922078cff848e52b79b29a9c2e48c24aa60836c5a8e8d0994c5cdecee6b9a2cc385df6f270816c020597c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3b988ae9a5504183b24d30fbb978f0
SHA1b7c5021025c2cb498e1f1fb61a1f3a73a3513e03
SHA256508a7ca18908cded2aa00a55f691936b5579541e4b30c0f865e34c732d6fef8c
SHA5123f113246bccfbc25d8173348fa5fa1597aa7946462180b8df9fa9f81147fd9dbfae611e7ac16669f88e7e6e7c862e0006f0654e471f6501aefd5f2b829ea1e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43962dee12aa613f67114ca3c6a9a99
SHA143b02655c357918f5cf3346fd6297ba57e5a8067
SHA25653a01991c4f6fb63071eac1cba69aaa9cf6155ad85f1fab6182d2e5a25baaaf4
SHA5120e845360c290ea75760ca8cb6a18dc8da63cdc89cfc830fc6243cc1c3389985819d71d50c792f742c36c00a1204e6b2b95c61639c26a1566aca7376f5e4f192b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57557ff0460bbe493ba853b8a508b9102
SHA14b74bf515ec10b941796a81b618ccba1bc5515b3
SHA25662e09d9b6a24833ea269479636d4228139bf6b47da95df16587205f1175ecd2b
SHA5129c87ca2929902d970d1ff6eb65852f33bfcf19ba84fa05c445af487641c23af526c80409e28a42ed2641d32cccb4ffc98aa39825d4f9d34cc8eb21d7bc7be461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe48f652c8934b10fd42b8efbad26bb6
SHA14c4b6a79917d84306e78c4e65a2943038114baa1
SHA2566152f1d212540280e36829cf79ce78dbe31dbaf8458642852e6f5a16e77d7885
SHA5120de78753ab201619c3bb962d62d7674246b6e22b6aef8cf09611b3f4edb9828b2e6fd893c0af7f736d2d0b1dfc26b7e6fe3c168ea624c7878e365f8318371bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3dc5e273aa6923d5e50782860d6343
SHA1065d69532dcec228d64670c1bdb7d3712530bb80
SHA256e6e61fd2375fdb348f84010b647d4d4b43eac0b1521dcd056ff9063f40388852
SHA512838bf8bf23697214da5681733568ec4e4d1dc9ee8ad2f8f07c8380ea1f586b31fcd732827984772de4d22eff4e9e481b1f24397996ee8652f301b19713ba809f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f75e13294f557690cfa0b7a595fb29
SHA1f49b1d4fcb6b2f4dda798ed71e20f0c82e40da2a
SHA256dcbb3458deac27777cfb564d818f3f43b97e43c3e7b2d0c36482c81ba1f20e8d
SHA51268763101c942277adf0e773801f18c55827014c600d034f62d66202ca8b2bb328fb9cfb4f72c906046f2e7a7b312b5eda16559d5dbee7b190555224ebe5c02fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d0c7f3d9fe97c463764cb49ff85629
SHA116d82dd1c903ddc95612fd6ab77cd45a43c23aae
SHA2567efa59b87afb7395ac3ca197c0d77468066e46a93082c1ab37c3a0992d0ad1c5
SHA5128bb3aae3cb2058defddc2459ef8eab36f0bda77c163ca4ea2fa76802c4e25bd00a4edaca9a0591dc24bd9cbb2e2d75e704aea826660261e769e7122e8cce450a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea534e739be16215ec223ebfbab8456d
SHA16b6efdfeea87873335ee5b1ffc8e8980c3fb62d2
SHA256c1a77e1063127bfee3e43b7722dea3262675456f464f9ce043ffcb536f4a3bf0
SHA5125a6bb61fdad2c8930270c8eb73ca200cd2c6e5e88675da4c0fc7a48777b03d1130e0b1f7b6df0344275c9475163a1d3617f568a8da3945e56af735360185e64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55596a3ec7766ef472e4d97a01b53b8a7
SHA1a30cfe8276e154aa6bdc45dbc92980bbf83e936a
SHA25616623d208e01322e59e12ccecf2314e8e583c92a7dd377b7dad984a80e206616
SHA51202a21cb0f60a00981419ad90b8d2b3646e705abf5f70744b2b3123c9a9ac96be51a8317c1aef8167a3b7d3e121f70d0e9e9756748cae25baf5903ffe0efd2fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca355b754a66bed684c99652d67f0d3
SHA1f413f341fd52c89a85587d837e65805ed3c9cdbc
SHA256f859edd8e608079600d83fc89ef1691f81858409b8e4f8f6da31216bd52057d6
SHA512a375f1aba77e7ba2e5ae60ab23fcb6ef1fe7d132c3c574c1649f47d85377b24390ba9718ec401028ac191d15ff815e52ab0786eceba7f5c266dd3232e8bf7135
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b