Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
36c02d3bda1f50d7108b021c5a5cb2e6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
36c02d3bda1f50d7108b021c5a5cb2e6_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
36c02d3bda1f50d7108b021c5a5cb2e6_JaffaCakes118.html
-
Size
13KB
-
MD5
36c02d3bda1f50d7108b021c5a5cb2e6
-
SHA1
1a40a3aa36bbd3a58c72ae5b514d05d37fbc8131
-
SHA256
016b5b63c166abc37588f6fa588055c45c42cf36509ef510adab1af4ca0fc03a
-
SHA512
0dcbafae5bfe4dec56e9c86bcf494c48f21debaecd00f2093a2c17ca6049665ce173b88ed876a1ceff8be28adda9ecef880f1e4f8971c04f13308c8f7217e7e3
-
SSDEEP
384:F9WbfLR8ZfkoTwtzySENCtz8XJpgtlVe2quc:F4fLR8ZfkoUzdEUIXHY3e2q5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57A82A41-3F10-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02f992c1dd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c4b723a01a60bc87b8e95484570bd42191aa1a7b7e3959f060bbda2ad837a0f2000000000e80000000020000200000003741e1aee966d52c8bee2ac820df32d112d3e40e56f3ac68b4e3d77f8d12241a20000000a906a1ae7f0a6c97f2b27e63b4dc729b95dd8fadfcb132860cfb9cb69050acef4000000000b1e8513f2cd947f72461cb5ba92f2d6602a0ea888a183178338a33d4612b9429a48682d75501b6c840a78905b609c46504a3b1e72d3c6c4104fb5524ac54a9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426814357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36c02d3bda1f50d7108b021c5a5cb2e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209277a8ba551a4368ed2bfdad75cd9d
SHA12a75b371ba17bcd6ba4e91b9f704a1b4aaa9946e
SHA25620204931ff1865a5f36539eeeec5d87b41c68a109efc7cdfb1665942714c6bf9
SHA5128fc37bea16b849a6bf96e6ab36355962897929ea1e18bbb0ea6c24244fbc8a3ef9f4dacc59dda62f92f5eb904c114eaeccc9cc403e03a809340a8c3f1351efc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ea62dedf39428b0003e9cd12ba9e89
SHA1f0f0f8a4129f7ac5db0d9736734a7ec0b94f108e
SHA256507c76cd5e3ec9e23447dae092879ed72d511f062d8cf339ad5b82d370158c1e
SHA512da1d4d745e378ccb0ccb4009e8633ac0d6a6fd4d368f1d742052ceabc4f3b7e83947130704e856135ff0720bfdcccae6b5f7b8a1d8df43ca0fe3c32c9e923faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef8ce18b057fe3ea7fa66a94f170b8c
SHA1476462d699f4340226a861dcd9686b5d0079a55b
SHA256502634bc44481b238217b0e36f2ed8c6c762b5c37295abcea120938e7deb9716
SHA5129bb1bf2a73ff125341e557579383573552a2725e223cab6d59a8ddd98b13cae3a9e53020fe086227539abc345650f567033a5cf2460b1f05630775681a3ac02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550f324a0324f8ef6f8d7263f09e241f
SHA108d06b4967a419c519da84f86b9670a6ba30c238
SHA256def62abd5d6f2ef425060187a6741331c75e1197a03e390f301ea815f97b3018
SHA512d3055c9452936a440aca1eb700905d1a2db5382f82ad5d114e89eca7a5f02710f0cafff489274105d0d91bae965fd400edf9738e0d1ed1bae59c9167c4eb2b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0367b34322cdd025b10c8f6e4ef47e
SHA1f00d96bbf67c3464e9de72b5a2b65a08155ff14b
SHA2561c865398d6dfdcd671eb0c0c2f6c4af145c9c64e2ead6bcd799de31a9b429cc3
SHA51272704c16958c0958944914f5aa0a3e659cbb99b4a0dcced201997a1717821ccbdb997edac35bb0e5dde3735570d8a3c1d5234566e8cf21565cb94cfc0379e13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000b882c087c1c7486a02d2e1243dbd8
SHA155b69f7013612ef17cc23f81acfa232d61ba7a86
SHA256c389b4ad08951d7d4d6efc10bdfb8af19803186d42bff2d228823d2a6104de2d
SHA51233fe6da724f45c9296f17ca0543228aa7b2c63cfa6694713c5644991626b5da9c4ae5717409c42343d7485cddee318c5a8649243c83f5b68b12df84263c34c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad2387ea3fa1c79a441c6aabdb8d33b
SHA13fa5ed3c54f94f7c2e8444b4a978c247e0a63468
SHA256f9f4e9bde6bbb1817bcb008d435aecdb9913930fe4115a56b80cee9dd0780210
SHA5125d398308dbe1ff66372e0995256e7e5598cd8a8c59b85167a433a774bfe26e833da0449d4856fcaca9ce19ec4f54bbf54c1d11f71af92dbf69d7cde00e6c251e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709767668209b342407839ad5e689373
SHA1ca1a15da11cffd8a662171205892aa3bf5e0de01
SHA256cd70f56a817ea079bb20dc276559161ed4b9df7cc29623c8e0feccebb7ca1a63
SHA5129b2090456118c9756fc95e07e248db63e13137242c6879b80bf31980c661e9b4c429e62117d5c5cf9c909d54f0dfb7be9db3806458d8e8af271ea0f412234f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa060b5c0a777e23257575c92a49d85
SHA111abb5360d5317728cd391f6182ac08884983175
SHA2561c73700b40f925aa9551d1f85890afa937ef77a57edbc373ba6bef7574b31560
SHA512cf46012841de36b66b31bdafa5da2f0c9bd24a434d6472bc195159a82a890e8995d2c86313e8be6c537146b901f3f35325d4544b3d3f88217bc6ea0531f3c230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ea640aca8d59e628cf07faef2c8489
SHA198909c66541b5a2bfbdeaa93c7d112d2ad87843e
SHA256137cebeeed5a8a87031bcaa837f8f3d248bb9b411e39b706653597c23fc3171e
SHA512eb23c3ff810b47fb637a6b93113fd70f70f144ed2623a9e316422d17228b538d0d816dd9dc5f0ed38643c2199e3c5f109b485f931f81ae34409141ff3a9f08eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f947a595677de81e7c01b4b0b2f78e50
SHA1c08d6990f60d0d751e015049ae77edc3bbcdc0f2
SHA256f27236f7f947bc075459102d0e13db9e4983ebb497cf5dbb7393ff2847e63a3c
SHA512f03019d9004d83ca023a17b8bd1644b9f156e826dc489e32ffa3d9d8d57c5708d34919367749e5f8a6d933d630aaa03c3d603aa17d1bfa006ae644ab70fb2b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68459cbad996e6beac3980811f48a06
SHA172dc21bc84bab9e34e363a11ad884a23b3fad1e1
SHA256aea1376e07ca57dcad3d9e65daab7bbea776eeb987b4549129a5eb29b2c07d6e
SHA51275f6b907db44ee0d90691b0195e9c27e6c40ac45e95babb11bec14b3645252564f59c9620bb514915484dab843915af846da4847f04d25f4fa2c7e23f9a0717d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755fb9475121328ddef4b49461d52b13
SHA195cee6df250ff5e37aa31bed28fda67699cd2146
SHA2561ae3af16a43a778d8db31e2876c7984d2b937ebbba6fdfac4e5d7c956425c72d
SHA512ccd01590f0ffdec3cccf2d4bd92dd56f11bbb4ba5c201b3ae9586de71962b360c62caa52f50fa66a0f79007e3d8e822999c407a368bc76ecaaf0df405cdbfcd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543168e4639be6e36e0d7caf0263e07b
SHA17c658a279f9b37eab38b391e5d895b73752df141
SHA256274e5eececb2d04a8b67effd1f4e5cb7ea688f3d673459f37dbe5f73e8bb6b43
SHA512b09340594bc9c76532f0079b4923e0093fb14f87ff743eb40f3cae6a035ee235533e19f662134abf63e19be4e595ffa2f9a6888f2cce2df190183d5c6a168c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb29381fd2789cac74e1616cba57e0ff
SHA19e5854c441d035784d5efa89ffd9cc04f059e8c8
SHA2564ad13a836611ca1cf5c1ca5082a402edf2a52d228d240e39b9f107fb3b4b43db
SHA512a550ba1431a1eaff91770b8134d43fb9152a77fe3bc73ede50ffbc6e470346b21a5d6b13994f2877db4fba5fed1d32a38037bdba100ad114b5735fa022ef939e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36115eef0ed7babea3daa87cb46a54e
SHA18890041521132044f99915432414c1933cb4ace0
SHA25656b23b4e8c793b1f1277f3609d0592d943033fdf182cac9009f000e84847b360
SHA512cb4bc945e863f421b33179273a92020ca022f68d1f22335a0f11224028c21fc8730620ad6ad9b18fd51df4d85ace530241424db614ac4a83d7e1d094c5c55040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e26f825596124b82b7ba74a6f31d6d
SHA14345936a797df54bcd3fdff71c88a53e276b01f1
SHA256b5105ec8620404cacb14907ceb9e91761f03b4be5a8f01fa0a74310b033a2a4f
SHA51245a5094abdec0acf54237d7d29e6b5d774d360395446e59b9c4e3039771fd655e372d1875f27b329507e6816db1b602898cc9063d4b99b073af9cbe9b2954bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb6b36e6c4f51d311164b950153f00d
SHA17422a7866b9daccd4384c5aa61b1e29763cd2213
SHA256663a861060b444173ea5a9a8fd84b99260e2d962dc555b156ce473ac97794707
SHA5124a1502d62ddc974941f0577e442c76f0a8992bce1bd1baacd3e8198f2bf72c77d6be3ab4f6e941aa10c59a32aa6a17a66aff4d55cd7c42a468bdd3850fc9ee29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572097de27d4e842641b3dcf65a2236c2
SHA15536d321e9ff653858268aa254305dc057f7d1b3
SHA256d14f9da79e00a74b50d9c05e4fe163e48153fd3628077dd62600ac7c49624a93
SHA51297d09a60a7625cb33af39ec20b7c5e6ef2336589ab1ef0ab529d0ceec985651e68a5df72666ed4f184cdf0f2e18ee0d944536ebd53b77cea0b73d30b1f81ffe8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b