Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
33f3495051f3ea8990a2045c4d48d4dc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33f3495051f3ea8990a2045c4d48d4dc_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
33f3495051f3ea8990a2045c4d48d4dc_JaffaCakes118.html
-
Size
53KB
-
MD5
33f3495051f3ea8990a2045c4d48d4dc
-
SHA1
5589793df6982329071812d8fa5ee8ce4b6b661e
-
SHA256
45ad647c507e7cac88fa3a29fef697830fc55f12d5f2055d5067b8d073415e2e
-
SHA512
607ce8bcb5bb564e140b59dbccb4ffcd0673cd6738108049b72fed62a9c5af7ecd90985faaf34b3f1bff0405f1253c8de24ecd012622c8469dc0faa735e2b84d
-
SSDEEP
1536:CkgUiIakTqGivi+PyU6runlYJ63Nj+q5VyvR0w2AzTICbbWo6/t9M/dNwIUTDmDs:CkgUiIakTqGivi+PyU6runlYJ63Nj+qL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0985502a2d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426761454" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003a454cf2bb7b21b72f494bba2ff06bb16dfd02aaac73e3429f402d92f164b2bb000000000e80000000020000200000008a185edc7d7cd3ae7af443d4ff947f48e72a555cc4897f21a3510ca60384189a20000000c2a867ae3e5d001ca923c077f327ef3239922ce1643ac7abfd1482a41749bf02400000001d8cce4aaf9cc7f89b7aba1b0c798728657c2befefebdfa500b302f5beafda9b30b5d5d4c460188b7ae4714d4f74aafce42b85c3acc9728968d32fed36e9c39c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AF095D1-3E95-11EF-A748-EEF6AC92610E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1488 iexplore.exe 1488 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2140 1488 iexplore.exe 30 PID 1488 wrote to memory of 2140 1488 iexplore.exe 30 PID 1488 wrote to memory of 2140 1488 iexplore.exe 30 PID 1488 wrote to memory of 2140 1488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33f3495051f3ea8990a2045c4d48d4dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489dea0dda2a4b518d44dccd406552d3
SHA1efcdaef132e65cd1a145d82fc1ce9b29182eed5a
SHA25648862a2d4d33f847bc9360bbff3c5ca739919482601517e6dbd2baf1d95ba881
SHA512de67e95574ca40d3ef52df22d42e7f428f1d7cf3d0457cd77f5347562161ebb480b9aab5002591c2128d6fc34662a4a842b327ddb8ea0b2fe11d518764ee5f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7467632fe0ede3af850bc7ba9664749
SHA1921fb9b060f2d8e7dc52e99d14a4da17e7c96e0e
SHA2563d79e59554c3c0e4255ee7d265626f5caa7dd2271f534e07537890fcb0e2e4b0
SHA5123fcefb964474614581c7027c0e04628926114455442f6b1dc81d9c97b39ad2bdc99ae7cd52fb5a71c170bab6814b8e0e993c9231765818aa04e2250864cd3c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55faf3dc50ae34e84116167495aa57654
SHA196d9c266c3943af2ad97bc50e378f154405c4151
SHA25638f1d36d7d36de91aa698bae3fad5e0e59c9a17a469e0eff626fe2214502236b
SHA51257dc3437ec8744000098bce23136133e89809a31505d48f599e5c7998ab8d0a0a48462ced365c01695f1351d79823c5a20daeae68b84ed6d7cc337f522faa077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4a7d2586c6664aa195c8af09152d36
SHA10135b239fbc3a088e7beb81a5448453058007b2e
SHA25679d9707f4503746bb8f51e649fbcd25b701c98ff30118dad45301ec708dcdf9f
SHA51285f1bc9d76c01641adadadda39b662b7d8ad648a28a39c773facc4d6570802724ccfd971394f572ea52368174f608541488acbb497c763c6d635b300acdf2e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224b80824fb54e25206a448cf0b81c35
SHA117b9d73f21c0eb276f212b638c972d3d316514ee
SHA256a13d858a5bf4a5737b7e8f7d02c770bbca61aeff45524a409bcd164d61bd57b5
SHA5123ee842d454bd47367849135225139a5aeb949c219dc306ff4bd4e40792c7f8b93115aff2effdbc448f51c3f7f650cb16b1a0e14b56604a8cf78d1e1a4e792554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e0f7bd216ed35b2d1a417ecac93e19c
SHA154c7f30f56aa64b00ec6f939bdea846b0fe2f597
SHA2561f05d4d4873e53529af7063efa673b40429a24d97753061908e7cbf89db9266f
SHA5125de4211c6f07c0d0c660b707ef446a237a5fe0d6f4994b14471ec906d40adc6a4ef9f25eff0dfc5770146662bf3392e1e5b9b6944c33cb472a445e5d8b38cd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fbfc405e410f6cd321d48c92602ecda
SHA155c308875899b56539a02af4acbd3a3abd6a1a2e
SHA2561953ae77cc4f6c64b1feb2894090c53613e893822f2142cb317e2ddabf2e90f2
SHA5129ea97336dd9c5686200325aee4238d4ea1cc5e9790a053524efc5f55c0607f0f3be0dd814bea0bac9ae688adbfa03d78138eef33a8078bec9c934d631a03d4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56657d16a1ee2b95fbf719790dc7e3768
SHA14221a1a1f800ee08e5980fc573ce13dcc483b828
SHA256d238f25079fccad0521b8fc3967b44ba4dbcd6790d0d4fe24b0d6194d8280aa2
SHA512610246f70af216f2e3d969fd9e52a991f2075e2626dc6980a1a3b386916b6cd32641dc5ae772fed4cdc3d9a91c52b0d3ce49364a6397a78d8b5996c4b561528d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12400ba2595b2c739e5e4e36e81e35c
SHA148166fa7436c73f06521c347fd90b15ed0b71798
SHA25639fe60c8c862bcc078565029e2e380df6aed7ae26e2bfd9192fb2df237992808
SHA512070a66dcbe43ee056c54f75c3a37175efd208b2487e0afe025629050ce52322fad102336aba01654c1d8ebd525f4ae0cecd73bf426b408ddefca30ea8d87bb09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20124c6ce8b72a9895d47fea3d68650
SHA1242e4e5fd587bf59fe1d30d4f11739a9ee0c8a64
SHA2565d94288e29355b314487e8288129b683fbe08436478aaee210a99359a46d8834
SHA5126560efe2c9bbaba92cbe422706dfd2c9251c33246547a86c01ea953294a22b79fc8f43b04bb25ca2f3fc13e119af93079d9d053d10dd60d5d786f93b54baf9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58adaa6a95a97640a37ccb228610300a5
SHA1d59b1db8a3c2487a5c9e97db3147987c0dac8110
SHA2560fb33e53711e02271b7e414d0258a8e190b85aec0b3c012cc5c7f6f07e874f52
SHA5128ca2509a1c1aa0ddbc86d4552f9aabe6bd6bddca053b4121a35bcf41194a075a28bc3f74c0b6e373019b9cc8490b14080a538dd134449f942c47c229f9e90924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768861964922d419e33d50d345e3aba0
SHA18c3388a5d1817a4c8c30de33c331a1cc7f947bd3
SHA256a2a3a0e7a4f4eb2539dfa73b8d90fa68c431bbb8e583717619b395d4d614cd3a
SHA51248c908a27538c8ee3dc8cb42d9f23d6405ee3091a9a29301c6c4b96f26c4ba0944371693631e1959a8121e9511d796052f57aae8a81552a1491a682675e9f1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526eb39f632d9c35398742048aeefe4f
SHA1d53fe87b65d0a3c961bb9e92b4adbf5b992f4562
SHA2569a32a3fcbafefa9c138c79e09bcff9eecc2cd768dd580904794ff97358aeedc6
SHA512c605d4751563de6f9c83873091f6db0f3cb199dd22db3d047615a8e1b4f6e48e58559e21e8deab2a2e6ac5c3442897906d0db7c00aaaedc2b301922ada125eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573eb5b15214a2a9eed83c1199356a1fe
SHA128a8316f3fd4e962e1706f18cf349f7ce0d3e6db
SHA256201f5199d1b9a036ff9c5374042900bf34eac9ff3884b6989451c2650b8e17a7
SHA512e82033678248afdd379df8b73475a535336d45583bca5b732c8bbd871a4cf4d67523c812be101570346e07057e15c21fb29272e1d14086d7308b316c35bce3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb28681193c074de09d0e1835cbcd2e4
SHA160f0443577e00b6a2a76cfb3a6abaeae1b5ab44a
SHA2568b81a13b9207ba526849205756ab4f444549b486659d646be95e7ab6bc71fae5
SHA51203be1941d1517a6b860913e8080ec033ff66e916d3766845024cfdfc8c6b434f89895aa45dcf13b7f301e89c47349420b4ba015572ed9591ad6594b869979679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a363a44177bb67603024da8268ff2ed
SHA133e0a206abbd6bae8828fc22a392f6ec3f997097
SHA25625071d21b9f4caf4f664d753285a71c5b2be3d328faed66a06073285df79ccd9
SHA512e57f2d9e7b6f47749cc68dd8be9b2b08d1f82b20c2b7c8af1185f5af1d5fa21af817abe854cfe51be3ca613f80d35a9ebd2730594d53bc6552137404d5a9ce09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f672fd4f96285d5676277faa653e55fd
SHA1045c2dd4cc80126ea09fcc70cd85fa94928918d0
SHA2566d8e8444211f447371801f6d6fa09edc120404dce10c6f8bb0de943f42558709
SHA512bc49e2b06dcedaf9a79b5ba1fc09e63e7e39f928850bf06c6009dd12dff6335ac0b792c4bcf508ef20ae1c3d447fe483abbbe249946b3a7f398b9a8e80f4c55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5282f4effcc855735c6a5cdb5770ffe99
SHA18e4aa9747b2400b17590f16ca84300363c2abba2
SHA256a590ed557ff3ea7808d87ae5ca342fae4ed8c5a7007557ec5bfe45e2ca6d7d69
SHA5121a77cb0161153159d2a75ad58d76754efc22db0c57f442c915f78b2f96729260608cd5e54eab700f20eb952355dccda4f2c30b17312f18dc4f7b79cbd0d1a07d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\useroff[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b