Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
36c9ba92429f4954a74e0b9946ab869e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
36c9ba92429f4954a74e0b9946ab869e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
36c9ba92429f4954a74e0b9946ab869e_JaffaCakes118.html
-
Size
103KB
-
MD5
36c9ba92429f4954a74e0b9946ab869e
-
SHA1
f46191b3c95980191f3a196e48d3ccf415042753
-
SHA256
35f556d2b8bd62b8c287dd632bf4ec3b35e3e624de2bfb90d2460225e9281082
-
SHA512
0314b23d31bdec9a2bbfc872bf63b157dd76e4640d3f0b9090b1eb209a30eaa06084d65fb2c2fda90a2f609f29f708d5856edcb00447c9e2cd4441ee9f1f4eb8
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fc3XTHAXceL66sxcZFcY6kp:sQiPLqY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000a22cadadbe94dee8658f13bc44e34fe9f2e0a57e975e6176d3b138fcadc685c3000000000e800000000200002000000072369e8471258af358dc13b013eef26684da33903e273ee77a6af1b78aa3a0c020000000ce8cbca03c019f8b9099e51352313430d84cd4040d3181e73903707f376ae44240000000f1453440d36b25b7762024bc0baf0356abd86b35781b830f6f6770e819f4a46d116ea0f8e6fe69ebb417e632df0524209d5fa7920ef161ce067553024407e0e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b021810b1fd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DC844C1-3F12-11EF-803C-6A4552514C55} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426815119" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2832 2272 iexplore.exe 30 PID 2272 wrote to memory of 2832 2272 iexplore.exe 30 PID 2272 wrote to memory of 2832 2272 iexplore.exe 30 PID 2272 wrote to memory of 2832 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36c9ba92429f4954a74e0b9946ab869e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571591a86a482b1a484ce4f8cff6af11f
SHA10c767df9aa58de13725d49fa2f72ce3c12de759e
SHA256857c42f9b8550aa2bd7a6f0047eca7bd8cdd6d5fb95ca8875167bb1e5b2afbd4
SHA5120757d8eae6408da08cafa9c3511112289b78bb64d6aa4e9a3971d23bd42781fef04c2c5f2d90cf0bd9526a1478c57774293e7286afcbd11e7b9d466949d5c67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf8e261ec51a727b321c7e26f1db5548
SHA1f3d9db9ddb1d99c2f1f44c7fe88648439eac0b39
SHA2564b2121adb1d9416884611ed6cf18ec145bfa966a7b09b19519230d6a1c243e50
SHA512acd826bfc6d2db5757d3a5b1165cce4dcf335438cd23c146db50bf328cc2d7f8f09eb18f549ec64ec43c405add1b8ea99f6d5ed86fae116ef4ec9f9b487126c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ef9f99f17e994bc0bcf119e1a6f131
SHA10cf84bc772259bc93daf2db4c9f262d261d67e69
SHA2561836383cb487d5cb1a35cdae30a4d5f58d8e5e2a0408acf59f1be1f045d7aed6
SHA512c0b21520e06dfc65b8c5e307a27a71b6aecbbf8d4511776f405bbc6b9ff363c98b781a9c2867ae44e820b86aa37c708f6d92a783fb14fc688724e500d042a14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4dc20ae112b2a25988c21edf69d6226
SHA100a8a0511c2f18ddc84cfb512146c046f9a490d0
SHA25662c09b43ab863077135defa2152cb541728aed837421007aa5144b2f12e3284b
SHA512d73c759ba902e92b90286e12413e8f4fed01f48a1eb863f4d0ebab555d313dc00f4a69f9b764fbdc8d7bc3c5708b47df0d88d42031a40d0792824503d0c8a92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5861e17dceda0c026d3f98374aa8d280b
SHA1507ce56b7f8dfbab343a39c1e85a07a8f46ff0c6
SHA256cc2fb511812a69d82bec69acaac952d7c9c1ffbb4e27642a61a2db374d435398
SHA512a11c32a73739f06e32cca4de47598bfe1565a67d5bf0db1f90112e141897d17c6d995d3b00a2b7bde40c83d531d9401b0ae1814018df039cbe2290df16bd5610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064a68450f1ba96ef72ae15e9d867f33
SHA10b285aa92c1023f2c9106cd49ac3d98edede82a6
SHA2565585995d6aad4873a8b5ebc2315b4a89f9600381c99ca5a4af9a4b173b6064e6
SHA51209181ef609329afd9aeecd921abb28a7019ec99d3230117ef32ef4ed4ddf9e9251b0299d5f03bdb21bff491717ad9e79e00932c59b310ffb81add91641fb8321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e36a65250d2792b6a445d8e2fea2e3
SHA1f3e7e705a25e6b0e44469cccd41849e2321e85d4
SHA25664230d26f2b1537db29db27fd9492b0661eb7057326a60d7c90a44720a6a3031
SHA51208d50c78b375d0487a2e75c123a1fe806b6297bdb46307082bc02f678910793a05fcf53626ca7475b3aba779eec1ce426e9a3310f2d666832266e5067c493dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71e0bbb6ee5940d6e8cc47bf12d28b2
SHA1a6ed87d693248539cdec8d7a5c7adf12febefc93
SHA2561ddf74c9ede05a65790dcd1a6099fcecfb837e70703bc7ae9e2609e2e186d096
SHA5125fcf96537ca2bd35055a033c3578899e86775dcc68831a8dae4fd11d04cd8d0febbe3108cbce8155a87e00d9516ca148dead59cf6b6767ac3926bdd3243eade8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af43752a9e40e6076c7167a512cb65a1
SHA1b1cc6e53611bba45caa85a75ed6106ffbc1adb9d
SHA2567a6621379121ffe1a4ac8d31520c5a25bbfd2311a530ee0c3169514f3d7fb50b
SHA512349d5d0009f10e5c2bef9c43f4ab810a2dbb2b45d3c8db55096a85891dd9c7c1230694c1251089eb35e1e45b2402299a45450511382d7bb4f82f22d898db29a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c2db013203aa22df1293e29d07eb2f
SHA1b39933b8487476e7a7084c7614616b7aa55f918a
SHA25666ef5c1c7097ee608b9a434011f70c7df4a27dc980aaf26797b0b86c7f2364bd
SHA512554a9bc830ce2a2a6b2ae94b9d8ccce27add4182a4172547cd401c4f8b5318f00d70983ff939e19f07b2bb4867f45289532601bf3cec73f72b62bdada4e65440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57230110aa55bda63c2fd94aa9cd20a9a
SHA10214a8d99e09cee9f760ff46bec8422e1ce57fd0
SHA25617c3abf624d53567f87ce8de145626e463e09ac12e3a9ed9da642500668f83de
SHA51253fe165541d976eb521287180e6e51925199d644bc762b3756f96883c460dfb8af324c14f6e58410bab63cd26288147e332469927a074a1c69455ecd6b803c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37e637c828916393bbc379e47b7b63b
SHA170936e901dbb6becdd93a6c495250e2bab0fd2f0
SHA256f56d2a181200c1dea7b51023d5c6e06e8ebe0a4fec0752e81a1a47c1518d5551
SHA512b110db1bb8fd93dc716f25c2e34df383df216fe178ab7daadccddf153ada3711878d1ffb9803d8f6f87d93eb394f0d43e00d8b97462e194bb63b6b8d4805379a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bd654b1bbab2e606759ffc7117a6d3
SHA103ecd1e2f60776458264e102e4b5c33909832a24
SHA256bd3dd92409055e235c78ff605e2c2b3a42d1af7da6cb1514293de8c7ec82193b
SHA5126898bd5134f69996d136fe90efd0af9346aa8d7f0142eab4314bf51de3ed0412c022f5361c21a2bfc3258b99d784391a67282dc1b5aeb2c541c36817095d4647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aacab14c4fa8c55e7cc6ca4bbe1c381
SHA1bb6eb4e50a24017c804e6a2f12cd94fa8f812fd6
SHA25688754c2c79b00a1268a238f038554368886d382e9018722c77ce11bb26c9ae93
SHA5123489e48931e24ea8718071937435b8c638b4ac0a28a0aa9f329ad1c1ffbe963a71427f09d3c6248c960fe4b4468e2609e310ef795b806440b516e375e07ddf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b8544f03805f940d486176a463b5d4
SHA1560e2bb9734be63467fc1b757cce2cea99688c95
SHA256a168fd05ac7a04c19c1cc9dc519aa939c1ad6ca6e25813a7e40156ad49f5f81f
SHA512c50e431e665cf3a080407635972dffd6a4cc3fc4bc14d2ded688b663162282f22853f5c55d13114139f55d15717bff82ed55792ef1804f7bc9e651639b4b2f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c0525f10b6d879ad0aa383bd37c7250
SHA146dd701e551bf9c1563759cd92c80285da7b81ed
SHA2568f149ce35c74d8a2e5267b008d809e5a233d82581017d204060c2007b19ad58c
SHA5125fa0dfd0a9441af5c5718c8d769c1bbb302207c8de6d2620419d8c6d6aaa7956d5082f7a153fecb6fab0125e33b1a68a38b6c7047f4229a3a707f3995054a71a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4659b501142c9b1b33918e745e7c5df
SHA147a1ae7455b3cfb85e236572b525d5d8599cb828
SHA2568a074a5e66de8c98dc576bf11692b5597ff6044dc8ed43da6729bc042b2e3e43
SHA512b7600885feb364e64646b6092bf5cfa5c3291200b87871614690bea58dc65e242e7f1969988f97f6a2af8b68e76edcceecb4ea5c3a0fc3295df98e15de47add5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf9eddb0f01c43564a670d3e47c71d0
SHA1b60267c35c13a7c8540e6d66fa8f538baeb049d9
SHA25600d6bd7943485af37d9bd7033ebe4ea97a709974e3794feb76ddac35e436e4fd
SHA512221937b6f8b58e43635c550cf532e0aba3fd4f48bdb9cca4ae9a8b02d524ad680240ab48884827eb9d1fe7f6f1923addb28000805df5336d1ca5a9bc9f22dec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508536cb215790188cfb554a71b46b9eb
SHA131d4c30d0539bf68455458316ee7f0e2eb494bb9
SHA25630f0654ceb219b593c3859a82a6fbb6d6cf0378a88baa8d24aa6f06838990f6d
SHA51252631811cf78850696d5d6163d061c3bc94c0cec5a77001e7f82114f390a8d03da2ab4ae886fe2933050b24cafc7e5d5ee35d786b1d5514d4ed9ec25ccd5bf0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd5891ec373e0d6e6782a51ad51da83
SHA1c335bb96ae3033bad1b477c142ad7b0c39c6ef7e
SHA256bc7589ffb9a85c261567bda99d672848f9bbed849fb8b9b9d5290ea8e8b58aa6
SHA51275fec2340b82f41ad77fac4a7dd54eacc0d9fe1b0683308225e1c0cfa52aab41c956c5fe5070d633361e106dbe7d434ebaa095df888d459406b297dfe2a5aab7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b