Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
336afafaa49c61907d4d4e6c70ef417d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
336afafaa49c61907d4d4e6c70ef417d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
336afafaa49c61907d4d4e6c70ef417d_JaffaCakes118.html
-
Size
9KB
-
MD5
336afafaa49c61907d4d4e6c70ef417d
-
SHA1
d03ace18bbb94ac4468d066374a52be6c514cdf9
-
SHA256
db3d0780f78691e77e13041cd154d7dfd4a095570944676e1fe32a3af6f70fff
-
SHA512
ca8d676019a050ee3eebd5b779277185d797ec90923ba0040026e169b62db8cce6b7733a07da9995b531730abc15f50cb25f5906eedf84ab7d35d6afba2f2c26
-
SSDEEP
192:rWpiGAtElAd9NQMC4JbDRZlWXQYjh4iyOykbb2Z8fNHYL9d:rtaAd9Nh1VDflLipykbyZeNHqd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000001c7aa26749a6ecc1f47861f7416dc6d226e42d85de1e52101c0f66bc2edff373000000000e8000000002000020000000db4f62a9649f5c711a971fa9bbc5cd36aafcea7b632c4cb85d1aac627d4d3fe52000000047154f4cdcb4edb3b07d3432f617ac66483a504708d54f89d959dcac3c0b1ff94000000054d6d61ff8347191d4ce267764da5172be48ae1f8ae423ef5f815766bd52afeb0601e7d93c9fc1b5a17338e7d88fae1a53c1aa7877f1ccb3ea7eb4af8fac98ad iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426750154" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e5bbb187d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DBA9FE91-3E7A-11EF-93AA-46D787DB8171} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2352 2976 iexplore.exe 30 PID 2976 wrote to memory of 2352 2976 iexplore.exe 30 PID 2976 wrote to memory of 2352 2976 iexplore.exe 30 PID 2976 wrote to memory of 2352 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\336afafaa49c61907d4d4e6c70ef417d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5979a8c5b47604eec628682e32e80bc25
SHA15d893106a3eef8a0faa93af2330144a444682254
SHA25695594a404cb68aba73bde6a78a0f7514d8f7ad12efbd28199381fc949adb1c6b
SHA5129df0edeac4c3d861f550124b0b18d3f0a8e9d324bf1783672a5bb90b73c4474acb6e0fcbf6a14cefcabf6f8a40440996d6c3ca2655310dacaf36149619fd0949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aa2655a8fc6113960b61afcad9c5860
SHA11147e27b07c6f59025cba16cd887d900551e8dee
SHA25639c085d7998c983acf980f69d0bffbfbdd4de5969c49c3c8fe0e9409a205cd5b
SHA51211f0d58594531fb74cf683ca84662ea136f166502cb24cde03fbd70b5b842814c8091894e277cd477469afa32b0fc19cf92281eb42f0c6836dc120840499e0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9c7986eb3c148c1582ec8ad027a14f
SHA1ff7df94b86ff3727926ff91b9be7038ebe6803c4
SHA256d3b92f871ae46bcc9e123637e220a5f26a11d5ac8a47db188ab5c5e0438e0316
SHA512387ceb7e1968c7f977a6e3a25d7537e185364d182e92de042f958e8f2b75cd0486a10ed7d563b2194a41485ccb5b2af21716053455ed01019fa74b0a5de038b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d67ff43f7c5fb0b60398e79046ba601
SHA1a76f41a79fd6fb4c100d0363a5c75d2e854b8ac5
SHA256b2ba00f04f88d50a0470d72555a9cb43cf52423582212ccc6e7bdfb6ba56c321
SHA51270bdfa19462b6d475b905d2bfb92a179be377d242ae746c79e5df0e3e8f62d7b2184feb12b4eb5039b2f2ba42f17aad1ae0707df0d0b72fcc3b544db9d598bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be410f5d6746ecdc55b576186478d2c
SHA1fb5fb6be1a43cb2b931b8254272b8de2584c1587
SHA25604e60f32500010f465271648e62e105be9f1240c67ec9b79ecd999c8359171d1
SHA5123cbd2f620e29209e5128f52aa03f2aaa636cc1b057fadff5888347c5c45d27a8eefb46b57facc2acb2f711570dc4d16f3609f03b42c1d8e7183adef74f4edb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c980eb29980a34c755cdac8482dda8
SHA14c1d16f9a6cc44f596e2ef645ee25c443a726c9f
SHA256fc53ceabf46767e57b6027008da901f17b444857d5d3a8aad702bbc3c8148fab
SHA512783fc6e4d0dd9740ee7579d20d2849543f2f5c3fcfb8dc912ce13d9d777946b00b1d5c869377ee0ca74ab2966b0142bd115774c322aa14a9c8816d97b07e0df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b8f086b679a2e055cea31ef407343e
SHA1caaeeb796a6906a72daac8b9189f9f6b5c43401c
SHA2562317f1dd02d8690f4c60b5eaad6778eb6fc15ca18443b202f75dfb0e49d59a14
SHA5126b0e3d2f68dc4efa5a5a74175d7558a82e0575fbb1fe4652ee4ae645fd26af0109a2ef188aea3b5acb4f1232f30cb6b82039c894371c71b9286f3d597d821860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4a9f8ffeab0961c7892fe99f3ec4ea
SHA16c41bb647b0d2d43de9efc8362ae36d7afb16a12
SHA25609f8a4891cc3130d4660d052b5224f37d20a293f16f541e67e9abb92e3c87d98
SHA5124a961fb22e85a3b5ed225ac164e315b2200680081f8488695ab1f6a98d29fa38bb343bc174997e43a18bef6fe35e41f2afc14c668b87657cb399f32753e3b9b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575099889d24848d20e39dcd992cffe7c
SHA1768d4df735a07a8364914cbdf464288666527950
SHA256c8404f0c74490057a78d605d4c7de8f87eb69eaa202349bce98feaa614347652
SHA5123f68366c33d36b5c0eaf43056d6dbe9287fddab9942d5b3f0da0362aab2de5e2e4e7d6cf17ebfea1ddde05e874fd3f8daf74ecddc21808211493de613840fc4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d19eb927bd23657f7aab12793ea21f
SHA1a61911b7618576a738090846969223fac19ecedc
SHA25679084b6b74585acdabae297d2997bb6d9b25e740ee2beab4a49f5f8b971cbcf2
SHA5125908251ba60063ef717eae91a28436d201d8d30350e9f24235c049d31b56873f84ad263ef7851cab629cc35ad6531a6edc4ac8f3f8414a326eafafc17a54f410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516024d4b39bcb69226523daddd0eb1a0
SHA1b431caf4d0232798f820fb9d52d7eb07eb27b824
SHA256e6c28ce7e75dd961325ae01425f2e1606703831d73abda0fd69857c0ee492aab
SHA512475e5efe7d24c565a191346410bf34e3cc9389442f823ad11b651484eab9925e9e407cfd7f2d1e3842eb5d413a91ac362f4cc2b7a66e0acd8dfff09c54f678d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b835373c6d8ecfcb327484bdf054d12c
SHA12814ec335d3c07b2e2e7529db52d44cff6bc3597
SHA256514a426daef1ef2b51c730888f1401631f12e491e53064f38393b3e82e683421
SHA512c19edf8cb3b5a5c57444e6beb3a9fa251a91c83dd991ad7193e0629df8117d1a71b8d24ccb2de43687b9887ea49a88a6c9881d92d1b002a6047126149c1995fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d536286aa48aff200ed002b0fa3c544e
SHA12e08e408f1d7868783ee7f1d194fb3516f74dc46
SHA256b1f20b4726fe5091043a70351aed8b72ee42c6bc8dd80a0d7227315153371b36
SHA512d03514537d2f371e5d627c0f21a273de5ce929eb07be86edb119501ab47d357125db5704303f001685aab274367a40d36ecbc9ccff9d86617507a8e2dc708a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de37e925f6e5c538a3d40e7b9bc990d
SHA1e730625f414024aae5921549e7bb4c80af600389
SHA256cf3ad5a7dd9097958c7565b9f28560ee22dd8d16d8c3fd98da97027a863d7434
SHA512e64f182b23397f5bf94e0edb1eac9d85825003026e0893cbb581f26d23c424ed8d43cc17801da1871b8499d2da29e6b1032a6e888da76a33026bd5390b4efa31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a7d7a5cede190d572c5278c76696296
SHA11017ba8d59b1b185892fba3e5145c33522027c19
SHA256aebdaceb7ee30fbc94e66c0fc3fb926aad911aba8ebc2f942f13eca692cb400f
SHA512d2876df31ae9fb5d3a2caf0d9e04a059185b92667c037a34a628ddf4d32dd1e8d8e2f57a619440f260223f61ca390dc3274cdca6e8ba4fb11e18822f33ca3e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c804761ef18a70678098214e511d8671
SHA1e09bc477e6822571b2f2456fe94a7d42ab26e0ec
SHA2564f36f501ae4257b93a5379efcffccbe92ac6406ec500d554037a3dcf30180f98
SHA512b0bf2fdc8bd3d86c593d3dfc9d36a76498c048234cc8bcaac3ed07cb2dc754728dea39b1d40f8bba7bfe23cd536c8e88864bba919f10c28c68de044da56c1eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f551aa71c1df3414a08aca2725db3d6
SHA17f4c021d68d1a4f48ae2fce81b7fa30aaaf2e7eb
SHA25654b373ee18b17fc3b7c62402e70a2b2ab8e4622d6b7c3e3caae78566806ed6ca
SHA51219711b038068c40a11ddadfb4f4826f636a93905f73f19641c9507fec424be5768d3109771251d0b4ab759f0b57b37e44249ed18ac169df2b313b4844c62333a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b08c91bfb8b7e9a41b86cbbebc2f8f6
SHA1214eb3ed30fbeca6279a17b3f65415a293c76240
SHA256d274c8730cead1bad9003b5a1bc7ee65e1739ebea0879d6d17058b17ec8cf095
SHA512cd3fc43b5e891b8018ab8d3f1301b9e1ce236f9c83484217b2489b224ac77da8f1d71722cf90be9dd44ad07a71a35d8c3116e8a2c820592134034f3d6cdbb009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d10597ed4c7a59e09352be146248f6
SHA195e164d9c69a842a4314f091d56f1687daa758b7
SHA25690586f829201c4f71f0d415e0c0721a469ed529f66b35349770b3c2130f1736f
SHA512ce270d1294f1ed1adfe8c6d17765d49a749cb0111abcc6797454421174a138101ebd4390c8d0f42950754337dc38c2beaa3c365ff02f8524859e98de266a6f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a427d1dff6554dc4301594dd450dd2e7
SHA1de81af96d945d3c3f60cb474fd58579d6d0dbe95
SHA25622fd16d57b73abd269caec11635cd7920ad104c9485627a26812248dfc9b0e35
SHA5124ddfd93af4d096782c3950d3c9f36e678fcb597d14ef4b8b27b0bd5ca515fc2bc171c00d0b0c53f3779dcfd8a15604a0b29382fb71ff9201e06e480645c537a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b