Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
33ae4eee8b400dee13e46b9d930d973c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33ae4eee8b400dee13e46b9d930d973c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
33ae4eee8b400dee13e46b9d930d973c_JaffaCakes118.html
-
Size
53KB
-
MD5
33ae4eee8b400dee13e46b9d930d973c
-
SHA1
a8f6a8bd2445889721055ad81c7dc1cf8516f39f
-
SHA256
98b39db0e16234cc9a381ec1c1098e6161e9b98a0c829ff20d409e255b0dc8f7
-
SHA512
685cfa464f819161f20e95795e00fc2ba7ee2190a116445d0c23df8ccd7829f599a7e0b61ad9141084d87bf144d4b69bdab9c589d886eab662fab2b7f8428f85
-
SSDEEP
1536:CkgUiIakTqGivi+PyUZrunlYa63Nj+q5VyvR0w2AzTICbbSoD/t9M/dNwIUTDmDi:CkgUiIakTqGivi+PyUZrunlYa63Nj+qm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d595ddc055cb2303af8d26483b5bb4e329e6a7590766e543d5b72b33afda77e9000000000e8000000002000020000000b2e194d31e68c217d9e4ad49517b501e891f0dc33de239a4d4fad553b02fddbd2000000094d00837e99f79c8ceaa62dfea0647c4f44f4336d0ae41f5a60b21627b7dddb240000000f64a1733adad026d1369abe7075ae05fe5a324829b97ae1381b651f42840f532bb9af055483d67feff6cf828594f91a09438173599a95ac6da32e26dc582c237 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426755388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B60C8B1-3E87-11EF-AD51-4E66A3E0FBF8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207e3de193d2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2892 2368 iexplore.exe 29 PID 2368 wrote to memory of 2892 2368 iexplore.exe 29 PID 2368 wrote to memory of 2892 2368 iexplore.exe 29 PID 2368 wrote to memory of 2892 2368 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33ae4eee8b400dee13e46b9d930d973c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789e9cbda421f2a12fc4a8e0657cdb96
SHA160ba80cfc6644cce855f0b6f31ab09d97fffdb61
SHA256d699b2dbdda298b7d8f64d6f9cd9710cc8dab054639c5274496abdd446671c96
SHA512049dc53f391dcb8584a5f4d202008a83f8880f9235e909739d6c2ee5b700368cd759261f6510fde8d87ff4ebd3d434aeb32f137b84da31d5d73872e34298fb42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a80e62b17daacc87c9bfa63f05f3d9b
SHA1c9e074061a399778416a6cce59242e619e63d43a
SHA2567c5fb2988d8e3a6eaa27a39c6d2ef083023d0712bc6868c2b079a79c08025372
SHA512e55478df14b915a747091a093b16ba90e182b84334062d03535e6fee447cdadc59556448fcc49d280993fb8ae875be746e0bfcf8bcdf092029a77bbfe0d5cab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577db5ddea84aca20bf1c5954f0a3d35e
SHA1c1739cda77af292284554aefd1ec959ccaf9e76b
SHA256d7d0264538f03f15e8722403bf1549a91b021e3143554b302c8a1d48a8129f31
SHA5128181338dd7fa2aee21b1067f0c8490f399b2e43233efaa55b0b147d4bf642432a643b18daf5c7c8d6b1f9192ce152a69882679255a638b32f0c7a4c84477d6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4a23b646f71748733eed1b5bafcfa3
SHA184acf68d20643fa3dfa1a92544747018d1a4f9c3
SHA256b3b827e60e08875e02996642f4884f83e68f7a37ff63014242e410ec4ee9746b
SHA5127707ccdb40c8196aacb0bde22a692763c2d8d2fc14302f3d0c5c097eab8e1d3684a3965b4af63f214ee59a122f51bc15b417784382f74c21dd646a7a37f38e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa975b72bc7122c384786180423110c3
SHA133709af49c81cd73731a7a5a4845927958ac4748
SHA256aac9ba59f7323c3092e87d9f21932e26dd6b8a0cdae5c30bbc6e12a2882b622a
SHA512c3d94570aef582631c4e8efeea88a015cbf4517ce7e6a952a2d6fa8fa97a8aaf7795e6cba97d8ff81a98e8f508a0ca63a28c72f9925b2a6276de90f849ec41fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ee1491cff626a6e6cfd6b6f067e3bd
SHA1293eb330fb99b070fb1773c60fdb31a5954e1cdd
SHA2569affbe0bc509b442fb8b70951f10de8b8b1d7a3d37a72ba92b0df4e4ac116e9e
SHA512ccd93639666920fd6e78219626f6add12124ed7f133ad22e70e594e465fc529deeaaa20e51e8522ee7800d20fc25ef29fe90f030baa847547c81680da41aabf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9305a6ea3cb18240ec01f553bab5e7
SHA1ea92957d1bd6468014c717b8a63c3c6bfe469799
SHA25652da66702ebce73957885900104ca315a159e07fe0cb339dca50c48a8485c0c5
SHA51266aa74d7efcdefcd2ff513487e039f90f644707f6d701836364ff97fff8de8df40a947c5e2e699df58372dfe9fc86722e3d31bdbccbac4794bf85ef38588cef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b18786ec929d72027e169f2e624a272
SHA1bcad10e55b7eb8d30e6cfd7b25635fef258c2bb2
SHA256a6dd3df516c4c8eb77c3e6dfcdff20ea1fac3ffeba7f8f2c8c7b34418d1b52e8
SHA512466b7fe0049f22c819a4c4aca806707f36031aea1673d778c589b3ba2cedc3b2d70dca9592ca4aaf4847ccefc638ac63f8af649da5d2b4def5ff2451345365e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e92f4df6c59df3dd6e41493a5fc48be
SHA14b6479a817b2302e1a7d713d66be5e3e7efc59f8
SHA256d097950f608ac728d2e723f316ed852fa004044227c962d0821e994337e0d787
SHA512abf9920306cc369ab6acfc019b3e0f279596cf131db48730276686d6836e4f0cd7cebd24def6fd1d8ccd7b977cc293c61da6574dd2a36d0245106c89879e5a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58753f16b248d21bfa6144bfe3b154a0d
SHA16b987da739b564c6f440b1fb4a4750050fb629e2
SHA25688fff7dcd63c25fbe59b572212dc34b0ec93407368ba0aa0528fe2769fc73869
SHA5125e0f7e927025019896942f9d9f3478964562fe809b2fedd397fb9b6c04d7540627e1ed25e3c7fb14527e878b9587a9229e6af57bd93f326245918fc65942f488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0979ee607484e728a9aca41a1010c39
SHA17c6f8cc40226d2b55b53d7bdba773cdb64e787bf
SHA256a6f7f9ba7cdf7170d5a83213835cf0f7c29d5209093508e91a7715433641c4f1
SHA5128116de3652bbe0c1a4fed06d147789fa1372228f78395a0743f8ce66d36125e21ff14f4c2851734dc6adfd3ff9f457db4b108ffc9b2655eec8d449e8e2d3c1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b65679cc53cc5434100819530d48909
SHA1457b85531298475b0c7d4d892511d9b8a1ec6433
SHA256583d9295a930d1a9c54046bff314a8d2eeed1babd612fff339b0766bc7cb4507
SHA512ded18b2b6dfe05684173c662172139badfaf5ce51289fafc86de98da8eb87e5ddf43c7c8fd28f54e3021c1fb8ea9d9a232202f2206a0c50f3d135c3beb7a80ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fce95f20f1c6b56a6b1678cfb9e31ab
SHA12dd07eec197069b47e0e284e82ddb437ee678ae3
SHA256d963f75e16d43837b34c5748367990d481496eaceae3bef4502b997aaa92d5d1
SHA51294d4b38dca8c471250278d951b014eeb82b3d2c187924976aceb342b99f56765d1819c61f7364709b3a8e16197f92fa283abd25e26c63c9a683af978aafaffbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae71b5da0cb7e27711ff80772150b2cc
SHA112b74be2929471aeea7caf0811bf8a57dfa7b5eb
SHA256c02bb856882fe5bd649d35f4dd12df9a46fe71d2c91df224f40d9bb45368558e
SHA512dd1efc8185fd437dfbe5b084fc78354f88fe90f554a2d9d388da9c5babc80db6cb0ff8d19eb670a2fadb3f6a2cd68cdbf96e58da21cd17053fa7bcc9ffd8ba4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf69339ce80a6519b0dfdac419c17555
SHA18cedd83e0c0cceb88485c44bb4d0f015797519b3
SHA256901cee9a93fcf0d436afa6afca4275fdf54c05281b03abbefaa74b40e0677e7f
SHA512801738ee274534d77ccccb5bcf9c77637e7316442bdbe3a2ae048d20bcc902d399981c09be1e2cd67f06aa4563be44932b4eba016728ee4f00872f9be5d131bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e4d734ef1561142a3f447a8097bb05c
SHA1c73ad469229a6f1ab731fd188fcf7411c064d233
SHA25642e58e8a70992e0ee09ead1172f23fbb37e8279520352e92d4e193cfe4090314
SHA512819640c2640cb98f2add7fa4d4915e6299bc732f4d9491eea2a8f2cf903da399b23aba849984f7effa859b58e73cfd4b2e159c06229aad5664e34d032da476fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b721a5b7bc2426833e15017d6471c003
SHA1f5895499be0994717647574b7ff4d4996f69da5c
SHA25620b6bbe170f1a6d125c198a1bc8013034a4d2f265db5a159f6c83b1327562254
SHA5125d94bb8b4bace3d19bee7194c253f8a3285070cb5b94cb02074a4ed6a520afd7b77bd156b5d68e4822ec653b4901f98e4e739c9d9020676517a85958f5572770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56f79ed6066a8c7026842b1ad92d761
SHA11c6140ef028f2191dd0485a28a7519e6b36c56b1
SHA256c213e82038f3c940b03fdf2803a575198110ed3abc7d06691d08568e8abc7822
SHA5122b329d9a50bb2fc953949ac2bda19d8d4979bb9cde8dfb35d810730a80bdbc50428ab13098d6bda51bb9d327923e4df134d4914b09da11034fc5ed06954ef133
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b